New BLISTER Malware Using Code Signing Certificates to Evade Detection

Cyber Security

Products You May Like

Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security defenses and stay under the radar with the goal of deploying Cobalt Strike and BitRAT payloads on compromised systems.

The binary, a loader, has been dubbed “Blister” by researchers from Elastic Security, with the malware samples having negligible to zero detections on VirusTotal. As of writing, the infection vector used to stage the attack, as well as the ultimate objectives of the intrusion, remains unknown.

Automatic GitHub Backups

A notable aspect of the attacks is that they leverage a valid code signing certificate issued by Sectigo. The malware has been observed signed with the certificate in question dating back to September 15, 2021. Elastic said it reached out to the company to ensure that the abused certificates are revoked.

“Executables with valid code signing certificates are often scrutinized to a lesser degree than unsigned executables,” researchers Joe Desimone and Samir Bousseaden said. “Their use allows attackers to remain under the radar and evade detection for a longer period of time.”

Code Signing Certificates
Prevent Data Breaches

Blister masquerades as a legitimate library called “colorui.dll” and is delivered via a dropper named “dxpo8umrzrr1w6gm.exe.” Post execution, the loader is designed to sleep for 10 minutes, likely in an attempt to evade sandbox analysis, only to follow it up by establishing persistence and decrypting an embedded malware payload such as Cobalt Strike or BitRAT.

“Once decrypted, the embedded payload is loaded into the current process or injected into a newly spawned WerFault.exe [Windows Error Reporting] process,” the researchers noted. Additional indicators of compromise (IoCs) associated with the campaign can be accessed here.

Products You May Like

Articles You May Like

Microsoft reaches settlement in California over claims it punished employees for taking protected time off
Instagram, Facebook to Display ‘AI Info’ on Posts Following Backlash Over ‘Made With AI’ Label
How MFA Failures are Fueling a 500% Surge in Ransomware Losses
Samsung shares hit over 3-year high after better-than-expected guidance on strong AI demand
Lava Blaze X 5G Price Range Leaked Ahead of India Launch; Tipped to Feature MediaTek Dimensity 7050 SoC

Leave a Reply

Your email address will not be published. Required fields are marked *