Categories: Technology

New PurpleFox Botnet Variant Uses WebSockets For C2 Communication

New PurpleFox Botnet Variant Uses WebSockets For C2 Communication

The PurpleFox botnet has refreshed its arsenal with new vulnerability exploits and dropped payloads, now also leveraging WebSockets for C2 bidirectional communication.

Although it’s mainly based in China, the PurpleFox botnet still has a global presence through hundreds of compromised servers.

Its activity starts with the execution of a PowerShell command that downloads a malicious payload from the specified URL, pointing to an available C2 server.

The payload used in recent campaigns tracked by researchers at Trend Micro is a long script that comprises three privilege escalation components.

Also Read: PDPA Compliance Singapore: 10 Areas To Work On

These target Windows 7 to Windows 10 systems, but are limited to 64-bit systems only.

The flaws that are exploited by the latest PurpleFox variants are the following:

  • Windows 7/Windows Server 2008 – CVE-2020-1054, CVE-2019-0808
  • Windows 8/Windows Server 2012 – CVE-2019-1458
  • Windows 10/Windows Server 2019 – CVE-2021-1732

PurpleFox detects the host system, selects the appropriate exploit, and then uses the PowerSploit module to load it.

An MSI package is also initiated from an admin-level process without requiring any user interaction, checking for older PurpleFox installations and replacing their components with new ones.

The backdoor that is installed on the host system is a DLL file obfuscated with the VMProtect file compressing utility.

PurpleFox backdoor installation process
Source: TrendMicro

The malware also uses a rootkit driver that hides its files, registry keys, and processes, reducing the chances of being detected on the compromised server.

Opening a WebSocket channel and keeping it alive

A new .NET backdoor retrieved from recent campaigns is dropped days after the initial intrusion to leverage WebSockets for C2 communications.

This component is responsible for setting up the communication configuration as well as for the initialization of cryptographic functions.

The use of WebSockets for communications is something unusual in the malware space, but PurpleFox shows that it can be very effective nonetheless.

Also Read: What Does A Data Protection Officer Do? 5 Main Things

The exchanged messages between the infected machine and the selected C2 server begin with negotiations for a session RSA encryption key, but even this first exchange is AES-encrypted using a default key.

AES-encrypted exchange between the machine and the C2
Source: TrendMicro

By sending “keepalive” messages, the TCP connection is maintained for as long as needed.  

The list of WebSocket commands observed by TrendMicro is extensive, and although there are some discrepancies between different variants, the table below summarizes them all.

Overview of WebSocket commands
Source: TrendMicro

Currently, PurpleFox is still active and there’s a notable number of C&C servers controlling the WebSocket clients.

By doing some profiling of the targets, TrendMicro reports the most notable activity hotspots to be in the US, Turkey, UAE, Iraq, and Saudi Arabia.

Privacy Ninja

Recent Posts

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications

Role of Enhanced Access Controls in Safeguarding Personal Data in Telecommunications that every Organisation in…

2 weeks ago

Role of Effective Incident Response Procedures in Strengthening Data Security

Effective Incident Response Procedures in Strengthening Data Security that every Organisation in Singapore should know…

2 weeks ago

Strengthening Your Cyber Defenses: The Crucial Role of Regular Vulnerability Scanning

Crucial Role of Regular Vulnerability Scanning that every Organisation in Singapore should know. Strengthening Your…

2 weeks ago

Enhancing Data Security with Multi-Factor Authentication

Enhancing Data Security with Multi-Factor Authentication that every Organisation in Singapore should know. Enhancing Data…

3 weeks ago

A Strong Password Policy: Your Organization’s First Line of Defense Against Data Breaches

Strong Password Policy as a first line of defense against data breaches for Organisations in…

3 weeks ago

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

4 weeks ago