In a recent campaign uncovered by CyberArmor analysts, cybercriminals exploited the theme of official Social Security statements to deceive over 2,000 individuals into downloading malware. The attack involved a highly convincing phishing lure designed to appear as a legitimate communication from the Social Security Administration (SSA). Figure 1 shows the overview of the campaign.
Phishing Technique
The cybercriminals sent emails to targets containing a URL that directed them to a phishing page hosted on Amazon Web Services (AmazonAWS). This hosting choice was likely intended to lend legitimacy, as many users inherently trust the Amazon brand. Figure 2 shows the phish webpage.
- hxxps://odertaoa[.]s3.us-east-1.amazonaws.com/ssa/US/index.html
Once the user clicked on ‘Access The Statement,’ the phishing page redirected to a second page with instructions for downloading the file. After the download, the page displayed further instructions on how to execute the file, as shown in Figure 3.
Malware File Overview
The malware has the following properties.
- Filename: US_SocialStatmet_ID544124.exe
- MD5: bc219ea52e5d250b689bfb0203eb9e4e
- SHA1: 97997862c73cfe301af43c355ffa4b2d8b1e7d7f
- SHA256: 1c939551452b2137b2bd727f13fab80da192f174d0311d23fc3c1c531cefdc87
Malware Behavior
The malware is a .NET application loader. Upon execution, it loads and runs a .NET application embedded in its resources. The loader executes two main components: the first is a .NET resolver responsible for loading additional files stored in the ‘FILES’ folder—these are necessary to run the ScreenConnect software. Once the dependencies are loaded, the loader executes the ‘ENTRYPOINT’ file, which functions as the primary backdoor. This component retrieves the command-and-control (C2) address embedded within the loader and launches ScreenConnect to establish a silent connection to the cybercriminal’s server. Figure 4 shows the resource files embedded within the loader.
The configuration below represents the C2 settings embedded within the loader file.
Scope of Impact
CyberArmor’s telemetry confirms that over 2,000 users interacted with the phishing lure, and a significant percentage installed the malware unknowingly.
Recommendations
- Verify Communications: Always access SSA documents via the official ssa.gov portal.
- Endpoint Protection: Ensure real-time protection with alerts for unauthorized remote desktop tools.
- User Training: Educate users on identifying phishing lures that mimic government correspondence.
- Monitor Network Traffic: ScreenConnect traffic to unknown IPs should be flagged and investigated.
Indicators
- SHA256: 1c939551452b2137b2bd727f13fab80da192f174d0311d23fc3c1c531cefdc87
- Domain: secure.ratoscbom.com:8041
- URL: https:// odertaoa[.]s3.us-east-1.amazonaws.com/ssa/US/index.html
CyberArmor continues to monitor this campaign and related infrastructure. Organizations are advised to alert their users, especially those in finance and healthcare sectors, to remain vigilant.