Open source reporting recently indicated new activity from the Iranian actor publicly known as Greenbug targeting Saudi Arabia. The incident used a Microsoft Excel file containing malicious macros which wrote a malicious executable and associated files to the victim machine. The executable in this instance appears to be a variant of a Trojan known as ISMAgent and uses the domain www.ntpupdateserver[.]com for command and control (C2). This domain has been previously reported as an lSMAgent C2.
In July 2017, Palo Alto’s Unit 42 reported observed overlaps between Greenbug and another Iranian actor they call OilRig. The overlap centered around a cyber espionage operation at a Middle Eastern technology organization using tactics associated with OilRig, but leveraging a variant of Greenbug’s lSMDoor malware which Palo Alto named lSMAgent. Additional public reporting on this overlap is not available, but this could indicate that OilRig and Greenbug are one in the same or two different threat groups sharing some of the same tools.
- b518cd2349b490514d1ff1a2a6ec09ec (Macros)
Dropped Files (Directory: /Users/Public/Libraries):
- B642.txt (9e5ce9b94471f1ba58099857020105a8)
- OfficeServicesStatus.vbs (46f4bb9e734c64d71cd8fdc0fc9e6f73)
- RecordedTV.library-ms (b6f9aa44c5f0565b5deb761b1926e9b6)
- servicereset.exe (ad5120454218bb483e0b8467feb3a20f)
- Saudi Arabia
- Greenbug; OilRig
Related Public Reporting: