Identified as targeting cryptocurrency users through nefarious cross-platform applications, a remote access trojan (RAT) dubbed ‘ElectroRAT’ has recently been in the headlines following an investigation into the threat by researchers at Intezer.
Believed active since at least January 2020, although only discovered in December 2020, those behind this RAT campaign have been observed as creating fake cryptocurrency gambling and trading applications that have been pushed through various forum and social media posts in an attempt to lure victims into installing the malicious payload.
Given the obvious cryptocurrency links, the financially-motivated final objective appears to be the theft of cryptocurrency wallets although functionality present within the RAT could facilitate the deployment of additional threats.
Ultimately delivered as a fake application, those behind this campaign have attempted to make their lures convincing through the creation of legitimate-looking websites (Figure 1) and domains.
In order to drive victims to these websites, the threat actors behind this campaign created a variety of personas on cryptocurrency forums and social media groups in order to post messages (Figure 3 & 4) encouraging others to visit their lure websites and download the malicious applications.
In addition to domains identified by Intezer, two additional suspicious domains consistent with the cryptocurrency theme can be identified through passive DNS (pDNS) records associated with the IP addresses
213[.]226[.]100[.]143. Based on these IP addresses resolving to the lure domains identified by Intezer, two additional suspicious domains consistent with the cryptocurrency theme were identified through passive DNS (pDNS) records as resolving to
Notably these IP addresses have also been observed as command and control (C2) servers.
Of the two additional domains,
cryptopro[.]trade appears to have been active during July 2020 and, based on cached search results, was associated with the malicious application ‘Jamm’ (Figure 5).
Having lured the victim into downloading and installing (Figure 6) the initial cryptocurrency-related application, ElectroRAT is executed in the background whilst a decoy user interface is displayed. Notably, and to support cross-platform targets, the RAT was created anew using the opensource programming language ‘Go’ (sometimes referred to as ‘Golang’ based on the official domain) and includes common functionality including the ability to log keystrokes, capture screenshots, execute commands and download or upload files.
In the case of the fake ‘eTrader’ application, the victim is then prompted to create an account and enter a passcode (Figure 7), steps that appear somewhat benign and combine to make the application appear legitimate.
electron.js (Figure 8).
Notably, further analysis of the Electron assets identify mentions (Figure 9) of a seemingly legitimate cryptocurrency trading application ‘Kattana’ and may suggest that this fake application is derived from the Kattana Electron package, available for macOS and Windows, especially given similarities in the user interface (Figure 10).
Maintaining support for these cross-platform targets, the remote access trojan (RAT) has been created using the opensource programming language ‘Go’ (sometimes referred to as ‘Golang’ based on the official domain) and, as is to be expected, contains common functionality including the ability to log keystrokes, capture screenshots, execute commands and download or upload files.
Continuing with the decoy element, the fake application seemingly uses real-world data to display convincing content (Figure 11) and seemingly mimics the Kattana application including some interaction to dispel any suspicion.
Somewhat appearing to be an attempt to gather credentials, or more specifically API keys and secrets, the ‘Performance Analysis’ tab of this fake application allows them to ‘connect’ their cryptocurrency exchange accounts (Figure 12).
Upon inspection of the code related to this prompt suggests that rather than exfiltrating the API credentials this functionality was cloned from Kattana and does not appear to function when tested. Regardless of this, the RAT element of this attack remains present in the background and does feature a keylogging capability which would presumably allow this data to be collected via other means.
Command & Control
Command and control (C2) activity commences with a HTTP POST beacon sent by the fake application, containing victim identifiers, being sent to a
/user resource on host via TCP port
3000 and appears to utilize the same servers that host the fake application lure website.
Based on these observed communications, this initial beacon utilizes a default user-agent string of
go-resty/1.12.0 (<https://github.com/go-resty/resty>) and posts JSON content with the following fields:
- Identifier GUID
- Machine name
- Operating System Version
- Operating System
Once received, the C2 server responds with an apparently empty JSON response (Figure 13).
Whilst not confirmed, the beacon sent by the fake application may serve as a campaign tracker rather than being used to directly control the ElectroRAT payload.
Subsequently, ElectroRAT has been observed as obtaining its C2 IP addresses by requesting ‘raw’ text content from the legitimate text sharing website ‘Pastebin’ and posted by an account named ‘Execmac’. Reassuringly, at the time of writing, this account has been suspended and therefore the threat actor behind this campaign will need to update the configuration of the ElectroRAT payload and repackage this within fake applications in order to continue to infect new victims.
- [ ] Users should be reminded to only install software from known trusted sources and conduct due diligence before acting on any ‘forum’ or ‘social media’ recommendation.
- [ ] In order to protect accounts, and cryptocurrency wallets, credentials and secrets should only be submitted to verified legitimate sites and, wherever possible, multi-factor authentication should be implemented.
- [ ] Users dealing with cryptocurrency should consider monitoring their systems for instances of the indicators of compromise provided, such as communications with known-bad hosts or using the identified user-agent string.
Indicators of Compromise
In addition to the indicators of compromise (IOC) published by Intezer, the following IOC have been observed.
ElectroRAT Payload Execution
eTrader for Windows
C:\Windows\system32\cmd.exe /d /s /c ""%LOCALAPPDATA%\Programs\e-trader\Utils\mdworker.exe""
eTrader for macOS
/bin/sh -c /Volumes/eTrader 0.1.0/eTrader.app/Contents/Utils/mdworker
Command & Control