Kaspersky Milum
by EW in
Attack Campaigns Digital Threats Trends

According to our telemetry, the Milum Trojan was exclusively used to attack targets in the Middle East from at least the end of May 2019.

Link: https://securelist.com/wildpressure-targets-industrial-in-the-middle-east/96360/

Summary:

  • Authored by Denis Legezo and posted on securelist.com on 24th March 2020, the article summarises the technical elements of this recently observed campaign by Kapsersky
  • Kaspersky first detected the new C++ Trojan in May 2019 hitting companies in the Middle East, many in industrial sector
    • Based on various field samples the samples seem unique implying the attacks are targeted
    • Kaspersky sinkholed the a C2 domain and monitored traffic, almost all of which was from Middle East
  • Kaspersky dubbed the campaign WildPressure, and named the trojan Milum
    • Kaspersky products initially detect this malware as Backdoor.Win32.Agent
  • WildPressure is an ongoing operation to this day
    • New versions of Milum being developed and spread
    • Trojans are hidden in PE files of the exe Milum46_Win32.exe or system32.exe
  • The malware allows remote control of infected devices
  • The code doesn’t appear deceptive on the surface – e.g, compilation timestamp is consistent with samples first-seen time, C2 HTTP header info shows early code versioning and plans for non C++ versions
  • The most prolific sample detected is an application that exists as an invisible toolbar window
  • So far not able to attribute the campaign to a threat actor or group
    • The C++ code, config, and comms are relatively generic
    • The trend of copy-catting interesting threat actors and use of common code means attribution requires stronger correlations
  • So far the spreading mechanism isn’t known
  • Kaspersky also speculates that the true targets aren’t known. The observed ‘victims’ to-date are possibly stepping-stones to other companies

Extracted IOCs and Artefacts:

Files MD5:

  • 0C5B15D89FDA9BAF446B286C6F97F535
  • 17B1A05FC367E52AADA7BDE07714666B
  • A76991F15D6B4F43FBA419ECA1A8E741
  • Original file names are Milum46_Win32.exe; on the target side they exist as system32.exe

URLs:

  • upiserversys1212[.]com/rl.php
  • 37.59.87[.]172/page/view.php
  • 80.255.3[.]86/page/view.php
Share Post:

Related Posts

No Comments

Leave a Reply