Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

A previously undocumented backdoor, dubbed Msupedge, has been used in a cyber attack targeting an unnamed university in Taiwan.

According to the Symantec Threat Hunter Team, part of Broadcom, the backdoor’s most notable feature is its communication with a command-and-control (C&C) server via DNS traffic. The origins and objectives of the attack remain unclear.

The likely initial access vector for deploying Msupedge involved exploiting a recently disclosed critical vulnerability in PHP (CVE-2024-4577, CVSS score: 9.8), which allows remote code execution.

Msupedge is a dynamic-link library (DLL) installed in the paths “csidl_drive_fixed\xampp\” and “csidl_system\wbem\.” One DLL, wuplog.dll, is launched by the Apache HTTP server (httpd), while the parent process for the second DLL is unknown.

Msupedge’s communication with the C&C server relies on DNS tunneling, with its code based on the open-source dnscat2 tool. Symantec noted that Msupedge receives commands through DNS traffic and uses the resolved IP address of the C&C server (ctl.msedeapi[.]net) to determine its behavior.

Specifically, the third octet of the resolved IP address functions as a switch, triggering different commands by subtracting seven from it and using its hexadecimal notation. For instance, if the third octet is 145, the derived value becomes 138 (0x8a).

Msupedge supports several commands, including:

– 0x8a: Create a process using a command received via a DNS TXT record
– 0x75: Download a file using a URL received via a DNS TXT record
– 0x24 and 0x66: Sleep for a specified time interval
– 0x38: Create a temporary file in “%temp%\1e5bf625-1678-zzcv-90b1-199aa47c345.tmp”
– 0x3c: Delete the temporary file

This development coincides with the UTG-Q-010 threat group being linked to a new phishing campaign using cryptocurrency- and job-related lures to distribute the open-source Pupy RAT malware. Symantec noted that the attack chain involves malicious .lnk files with an embedded DLL loader, ultimately leading to the deployment of Pupy RAT, a Python-based Remote Access Trojan capable of reflective DLL loading and in-memory execution.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

Sign Up for CXO Digital Pulse Newsletters

Sign Up for CXO Digital Pulse Newsletters to Download the Research Report

Sign Up for CXO Digital Pulse Newsletters to Download the Coffee Table Book

Sign Up for CXO Digital Pulse Newsletters to Download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024