TLP: WHITE 25 March 2020 Alert Number CP-000111-MW WE NEED YOUR HELP! If you identify any suspicious activity within your enterprise or have related information, please contact FBI CYWATCH immediately with respect to the procedures outlined in the Reporting Notice section of this message. Email: cywatch@fbi.gov Phone: 1-855-292-3937 *Note: This information is being provided by the FBI to assist cyber security specialists protect against the persistent malicious actions of cyber criminals. The information is provided without any guaranty or warranty and is for use at the sole discretion of the recipients. The following information is being provided by the FBI, with no guarantees or warranties, for potential use at the sole discretion of recipients in order to protect against cyber threats. This data is provided in order to help cyber security professionals and system administrators to guard against the persistent malicious actions of cyber criminals. This FLASH has been released TLP: WHITE : The information in this product may be distributed without restriction, subject to copyright controls. Kwampirs Malware Indicators of Compromise Employed in Ongoing Cyber Supply Chain Campaign Targeting Global Industries Summary: This is a re-release of FBI FLASH message (CP-000111-MW) previously disseminated on 06 January 2020. Since at least 2016, an ongoing campaign using the Kwampirs Remote Access Trojan (RAT) targeted several global industries, including the software supply chain, healthcare, energy, and financial sectors. The FBI assesses software supply chain companies are a key interest and target of the Kwampirs campaign. This campaign is a two-phased approach. The first phase establishes a broad and persistent presence on the targeted network, to include delivery and execution of secondary malware payload(s). The second phase includes the delivery of additional Kwampirs components or malicious payload(s) to further exploit the infected victim host(s). Technical Details: Propagation, Persistence, Backdoor (Module 1): Upon successful infection, the Kwampirs RAT propagates laterally across the targeted network via SMB port 445, using hidden admin shares such as ADMIN$ and C$. The malware maintains persistence on the infected Windows host by dropping a binary to the hard drive and creating a malicious Windows system service set to auto start upon reboot. The new malicious service scans and catalogs the host configuration, encrypts the data, and transmits it to an external Command and Control (C2) server via an HTTP GET request on port 80. TLP: WHITE TLP: WHITE Secondary Payload (Module 2): Module 2 executes additional Kwampirs RAT modular components on the infected host(s). These malicious components can allow for additional detailed collection of system and network interface configuration. This information is encrypted and transmitted to the C2 server via HTTP. The FBI has observed secondary module commands, to be highly targeted, and executed on critical business and / or network hosts, to include the following:     Primary Domain Controllers Secondary Domain Controllers Engineering & Quality Assurance / Testing workstations Primary Source Code servers Secondary Modules executed on the victim host(s), include the following additional commands being executed, resulting in much deeper and thorough reconnaissance on the targeted entity. Command Prompt Command Description cmd.exe cmd.exe cmd.exe cmd.exe Query infected system’s hostname Query infected system’s MAC address Query infected system’s version number View the current ARP cache Display detailed configuration information, product ID, and hardware properties Display the currently-running tasks in a verbose format Display the currently-running tasks with services hosted in each process Deliver basic statistics on all network activities. (-n=Numerical display of address and port numbers, -a=Display all active ports, -b=Display execuatable file of a connection or listening port) /c /c /c /c "hostname" 2>nul "getmac" 2>nul "ver" 2>nul "arp -a" 2>nul cmd.exe /c "systeminfo" 2>nul cmd.exe /c "tasklist /v" 2>nul cmd.exe /c "tasklist /svc" 2>nul cmd.exe /c "netstat -nab" 2>nul TLP:WHITE TLP: WHITE Command Prompt WMIC Command Command Description cmd.exe /c "wmic nic get caption,AdapterType, Manufacturer" 2>nul cmd.exe /c "wmic timezone get caption" 2>nul cmd.exe /c "wmic IRQ get caption, IRQNumber" 2>nul cmd.exe /c "wmic port get StartingAddress, EndingAddress" 2>nul cmd.exe /c "wmic csproduct" 2>nul cmd.exe /c "wmic computerSystem" 2>nul Query infected system’s network interface card type and manufacturer cmd.exe /c "wmic cmd.exe /c "wmic cmd.exe /c "wmic cmd.exe /c "wmic cmd.exe cmd.exe cmd.exe 2>nul cmd.exe 2>nul cmd.exe /c "wmic /c "wmic /c "wmic Query infected system’s timezone Query the infected system’s Interrupt ReQuest setting in the system’s BIOS Identify open and closed ports on an infected system Aquire the computer model of the infected system Aquire the computer manufacturer and model, to include (32bit/64bit) architecture information Aquire motherboard manufacturer, model number, and baseboard" 2>nul serial number cpu" 2>nul Aquire the current CPU settings for the infected system partition" 2>nul Identify disk partitions on the infected system Determine the current BIOS configuration for the infected bios" 2>nul system startup" 2>nul List programs that run on startup on the infected system netlogin" 2>nul Display login sessions on an infected system portconnector" Identify open ports on the infected system /c "wmic memphysical" /c "wmic share" 2>nul cmd.exe /c "wmic logon" 2>nul cmd.exe /c "wmic OS" 2>nul cmd.exe /c "wmic logicaldisk get caption,description,size, providername" 2>nul cmd.exe /c "wmic desktop" 2>nul cmd.exe /c "wmic process get caption,commandline" 2>nul Display the amount of physical memory that the infected system has Display all shared resources Display what username is currently logged onto the infected system Determine the current operating system type for the infected system Determine the current disk space, type, and manufacturer Query desktop configuration settings through the infected system's desktop management software Generate process list of current infected system TLP: WHITE TLP: WHITE The FBI has discovered that the Kwampirs RAT establishes persistence on the victim host by creating a service with the following configuration: Kwampirs RAT Created Service Service name: Service display name: Registry key: Service image path: WmiApSrvEx WMI Performance Adapter Extension SYSTEM\CurrentControlSet\Services \WmiApSrvEx %SystemRoot%\system32\**Executable Filename** The FBI has identified the following Kwampirs RAT executable filenames: Kwampirs RAT Executable Files - Found in: c:\windows\system32\ wmiaprvse.exe wmiapsrvce.exe wmiapvsre.exe wmipsrvce.exe wmiapsrve.exe wmiApSrvEx.exe wmipsvrce.exe wmiprvse.exe wmiapsvrce.exe wmiapsvre.exe wmipvsre.exe wmipsvre.exe The FBI has identified additional Kwampirs RAT DLL files, utilized by the malware: Kwampirs RAT DLL files dropped to disk Files identified in c:\windows\syswow64\ wmipadp.dll wmiamgmt.dll wmiassn.dll wmipdpa.dll Files identified in c:\windows\system32\ wmiadrv.dll wmipdpa.dll wmipadp.dll wmiamgmt.dll wmiassn.dll Other files created by the Kwampirs RAT Found in: %SystemRoot%/inf/ mtmndkb32.pnf mkdiawb3.pnf digirps.pnf ie11.pnf TLP: WHITE TLP: WHITE Recommended Actions Post Infection: If a Kwampirs RAT infection is detected, contact your IT mitigation and remediation company and coordinate your mitigation efforts with your local FBI field office. The following information would assist the FBI’s investigation of this malware:  Full capture of network traffic in PCAP format from the infected host(s). (48 hour capture)  Full image and memory capture of infected host(s).  Web proxy logs capture, to include cache of the Web proxy.  DNS and firewall logs.  Identification and description of host(s) communicating with the C2 (ex: server, workstation, other).  Identification of patient zero and attack vector(s), if able. Best Practices for Network Security and Defense:  Employ regular updates to applications and the host operating system to ensure protection against known vulnerabilities.  Establish, and backup offline, a “known good” version of the relevant server and a regular changemanagement policy to enable monitoring for alterations to servable content with a file integrity system.  Employ user input validation to restrict local and remote file inclusion vulnerabilities.  Implement a least-privileges policy on the Web server to: o Reduce adversaries’ ability to escalate privileges or pivot laterally to other hosts. o Control creation and execution of files in particular directories.  If not already present, consider deploying a demilitarized zone (DMZ) between the Web-facing systems and corporate network. Limiting the interaction and logging traffic between the two provides a method to identify possible malicious activity.  Ensure a secure configuration of Web servers. All unnecessary services and ports should be disabled or blocked. All necessary services and ports should be restricted where feasible. This can include whitelisting or blocking external access to administration panels and not using default login credentials.  Utilize a reverse proxy or alternative service to restrict accessible URL paths to known legitimate ones.  Conduct regular system and application vulnerability scans to establish areas of risk. While this method does not protect against zero day attacks, it will highlight possible areas of concern. TLP: WHITE TLP: WHITE  Deploy a Web application firewall and conduct regular virus signature checks, application fuzzing, code reviews, and server network analysis. Reporting Notice: The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office or the FBI’s 24/7 Cyber Watch (CyWatch). With regards to specific information that appears in this communication; the context, individual indicators, particularly those of a non-deterministic or ephemeral nature (such as filenames or IP addresses), may not be indicative of a compromise. Indicators should always be evaluated in light of your complete information security situation. Field office contacts can be identified at www.fbi.gov/contact-us/field. CyWatch can be contacted by phone at (855) 292-3937 or by e-mail at CyWatch@fbi.gov. When available, each report submitted should include the date, time, location, type of activity, number of people, and type of equipment used for the activity, the name of the submitting company or organization, and a designated point of contact. Press inquiries should be directed to the FBI’s national Press Office at npo@fbi.gov or (202) 324-3691. Administrative Note: This product is marked TLP:WHITE. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. Your Feedback on the Value of this Product Is Critical Was this product of value to your organization? Was the content clear and concise? Your comments are very important to us and can be submitted anonymously. Please take a moment to complete the survey at the link below. Feedback should be specific to your experience with our written products to enable the FBI to make quick and continuous improvements to such products. Feedback may be submitted online here: https://www.ic3.gov/PIFSurvey Please note that this survey is for feedback on content and value only. Reporting of technical information regarding FLASH reports must be submitted through FBI CYWATCH. TLP: WHITE