Venom Spider Spins Web of New Malware for MaaS Platform

Share:

A novel backdoor malware and a loader that customizes payload names for each victim have been added to the threat group’s cybercriminal tool set.

A known threat actor in the malware-as-a-service (MaaS) business known as “Venom Spider” continues to expand capabilities for cybercriminals who use its platform, with a novel backdoor and loader detected in two separate attacks in a recent two-month period.

Researchers at Zscaler ThreatLabz uncovered campaigns between August and October of this year that leveraged a backdoor called called RevC2, as well as a loader called Venom Loader, in attacks that use known MaaS tools from Venom Spider (aka Golden Chickens), according to a blog post published Dec. 2.

RevC2 uses WebSockets to communicate with its command-and-control (C2) server and can steal cookies and passwords, proxy network traffic, and enable remote code execution (RCE). Venom Loader meanwhile uses the victim’s computer name to encode payloads, thus customizing them for each victim as an extra personalization tactic.

Venom Spider is a threat actor known for offering various MaaS tools such as VenomLNK, TerraLoader, TerraStealer, and TerraCryptor that are widely used by groups such as FIN6 and Cobalt for cyberattacks. In fact, FIN6 was seen leveraging Venom Spider’s MaaS platform in October, in a spear-phishing campaign spreading a novel backdoor dubbed “more_eggs” capable of executing secondary malware payloads.

Even “More_Eggs”

That platform apparently has been enhanced yet again, this time with two new malware families observed in recent phishing campaigns. RevC2, observed by researchers in a campaign that occurred from August to September, used an API documentation lure to deliver the novel payload.

The attack began with with a VenomLNK file that contains an obfuscated batch (BAT) script that when executed downloads a PNG image from the website hxxp://gdrive[.]rest:8080/api/API.png. The PNG image aims to lure the victim with a document that is titled “APFX Media API Documentation.”

Upon execution, RevC2 used two checks for specific system criteria and then executed only if they both pass, to ensure it’s launched as part of an attack chain, and not in analysis environments such as sandboxes.

Once launched, the backdoor’s capabilities include the ability to: communicate with the C2 using a C++ library called “websocketpp”; steal passwords and cookies from Chromium browsers; take screenshots of the victim’s system; proxy network data using the SOCK5 protocol; and execute commands as a different user using the stolen credentials.

A second campaign occurring between September and October used a cryptocurrency lure to deliver Venom Loader, which in turn spread a JavaScript backdoor providing RCE capabilities that the researchers dubbed “More_eggs lite.” The malware is so-named because it has fewer capabilities than the previously discovered “more_eggs,” ThreatLabz security researcher Muhammed Irfan V A noted in the post.

“Although it is a JS backdoor delivered via VenomLNK, the variant only includes the capability to perform RCE,” he wrote.

One notable feature of Venom Loader is that the DLL file it used in the observed campaign is custom built for each victim and is used to load the next stage, according to ThreatLabz.

The loader is downloaded from :hxxp://170.75.168[.]151/%computername%/aaa, “where the  %computername% value is an environment variable which contains the computer name of the system,” Irfan V A wrote.

Venom Loader then uses %computername% as the hardcoded XOR key to encode its stages of attack, which in this case executes the More_eggs lite backdoor for attackers to carry out RCE.

MaaS Capabilities Expected to Expand

ThreatLabz believes that the new malware included in Venom Spider’s MaaS platform “are early versions, and expect more features and anti-analysis techniques to be added in the future,” Irfan V A wrote.

Zscaler detected the malware using both a sandbox and its cloud security platform, which detected the following threat-name indictors related to the campaign: LNK.Downloader.VenomLNK; Win32.Backdoor.RevC2; and Win32.Downloader.VenomLoader.

Elizabeth Montalbano

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
8:45 pm, Jan 23, 2025
weather icon 5°C
L: 4° | H: 6°
broken clouds
Humidity: 87 %
Pressure: 1003 mb
Wind: 7 mph WSW
Wind Gust: 13 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 80%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 7:51 am
Sunset: 4:33 pm
DailyHourly
Daily ForecastHourly Forecast
Today 9:00 pm
weather icon
4° | 6°°C 0 mm 0% 10 mph 87 % 1003 mb 0 mm/h
Tomorrow 9:00 pm
weather icon
5° | 11°°C 1 mm 100% 24 mph 90 % 1003 mb 0 mm/h
Sat Jan 25 9:00 pm
weather icon
4° | 6°°C 1 mm 100% 9 mph 87 % 1010 mb 0 mm/h
Sun Jan 26 9:00 pm
weather icon
3° | 8°°C 1 mm 100% 20 mph 91 % 1010 mb 0 mm/h
Mon Jan 27 9:00 pm
weather icon
5° | 8°°C 1 mm 100% 18 mph 91 % 988 mb 0 mm/h
Today 9:00 pm
weather icon
5° | 5°°C 0 mm 0% 10 mph 87 % 1003 mb 0 mm/h
Tomorrow 12:00 am
weather icon
5° | 6°°C 0 mm 0% 10 mph 84 % 1003 mb 0 mm/h
Tomorrow 3:00 am
weather icon
8° | 10°°C 0.75 mm 75% 21 mph 90 % 998 mb 0 mm/h
Tomorrow 6:00 am
weather icon
10° | 10°°C 1 mm 100% 24 mph 87 % 992 mb 0 mm/h
Tomorrow 9:00 am
weather icon
11° | 11°°C 1 mm 100% 16 mph 79 % 993 mb 0 mm/h
Tomorrow 12:00 pm
weather icon
9° | 9°°C 0.77 mm 77% 17 mph 61 % 997 mb 0 mm/h
Tomorrow 3:00 pm
weather icon
8° | 8°°C 0 mm 0% 13 mph 51 % 999 mb 0 mm/h
Tomorrow 6:00 pm
weather icon
6° | 6°°C 0 mm 0% 8 mph 56 % 1001 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€101,028.33
0.99%
Ethereum(ETH)
€3,147.09
0.39%
XRP(XRP)
€3.02
-3.02%
Tether(USDT)
€0.96
0.06%
Solana(SOL)
€245.77
-5.23%
Dogecoin(DOGE)
€0.339453
-1.93%
USDC(USDC)
€0.96
-0.01%
Shiba Inu(SHIB)
€0.000019
-1.70%
Pepe(PEPE)
€0.000014
-3.22%
Peanut the Squirrel(PNUT)
€0.338889
-3.43%
Scroll to Top