Skip to content

OilRig deploys new lightweight downloaders to target Israel

  • by
  • 3 min read

OilRig, also known as APT34, Lyceum, Crambus, and Siamesekitten, has deployed a series of sophisticated downloaders identified as SampleCheck5000 (SC5k v1-v3), OilCheck, ODAgent, and OilBooster. The downloaders were used to target organisations primarily located in Israel.

These downloaders also explain the evolving tactics of the threat actor marked by the strategic use of legitimate cloud service APIs for command and control (C&C) communication and data exfiltration.

Cybersecurity researchers from EEST unveiled the group’s latest set of downloaders. One interesting point to note is that OilRig had targeted the Israeli organisations a few months earlier using a different set of tools. This new attack shows the group’s determination to maintain access to networks of strategic interest.


SC5k

The SC5k downloader series is a key focal point in OilRig’s evolving tactics. Initiated with SC5K v1 in November 2021, subsequent versions (v2 and v3) introduced enhancements to evade analysis and augment exfiltration capabilities. The downloader uses the Microsoft Office Exchange Web Services (EWS) API to communicate with a shared Exchange mail account.

The malware’s version two introduced changes to complicate payload retrieval and analysis by cyber experts, while version three of the downloader added a new exfiltration functionality.

SC5k uses victim IDs generated from compromised system information to distinguish between messages in shared mail accounts. While SC5k v1 and v2 use file extensions to differentiate, SC5k v3 uses the Form and MailItem.

To communicate with the threat actors, the downloader creates a draft message attaching the encrypted files in a compressed gzip format.


OilBooster

This is an image of oilbooster oilrig ss
OilBooster C&C protocol. | Source: EEST

The OilBooster downloader is based on a 64-bit Portable Execution (PE) written in Microsoft Visual C/C++ and utilises Microsoft Graph API to connect to a OneDrive account controlled by attackers.

Once inside the system, the malware downloads the contents, executes files and shell commands, exfiltrates results, and uses a victim-specific directory structure on OneDrive.

It communicates with the attackers by uploading results and exfiltrating data with the .xls and .xlsx extensions. Although the extensions look familiar to Excel spreadsheet files, these files are XOR-encrypted JSON files.


ODAgent Downloader

This is an image of odagent json files ss1 1

This downloader is based on a C#/.NET application utilising Microsoft Graph API for command and control communication. It is a precursor to OilBooster, sharing similarities in accessing an attacker-controlled OneDrive account.

It utilises downloader and exfiltration threads to obtain payloads and upload data.


OilCheck

OilCheck was discovered in April 2022 and is based on a C#/.NET architecture. Unlike SC5k, it uses REST-based Microsoft Graph API for command-and-control communication.

It also uses a shared Microsoft Office 365 email account for communication.

While the individual downloaders are not the most technical ones, the collective tactics employed by the threat actor are dangerous for organisations. The group’s shift towards cloud-based communication aligns with broader trends in APT strategies, emphasising the use of legitimate services to conceal malicious activities.

In the News: Proton Mail unveils beta app for Windows and macOS users

Kumar Hemant

Kumar Hemant

Deputy Editor at Candid.Technology. Hemant writes at the intersection of tech and culture and has a keen interest in science, social issues and international relations. You can contact him here: kumarhemant@pm.me

>