Los piratas informáticos utilizan la biblioteca .NET para crear archivos Excel maliciosos

hackers use NET library

Researchers at NVISO Labs noticed that the Epic Manchego group uses unusual Excel files for attacks, created specifically to bypass defense mechanisms. The fact is that these files are not created through Microsoft Officethe hackers use the .NET library EPPlus.

Típicamente, this library is used by application developers, Por ejemplo, to add features such as «Export to Excel» o «Save as Spreadsheet». The library can be used to create files in a wide variety of formats and supports Excel 2019.

“Hackers seem to be using EPPlus to create spreadsheets in Office Open XML (OOXML) formato. The files produced by Epic Manchego are missing some of the VBA code typical of Excel documents compiled in official Microsoft Office”, – los expertos escriben.

It turned out that some antivirus products and email scanners consider this part of the VBA code as one of the possible signs of a suspicious Excel file, porque, como una regla, this is a storage for malicious code . Por lo tanto, Epic Manchego special files are much less likely to be detected by security solutions (compared to other malicious Excel files).

Por supuesto, this does not mean that Epic Manchego files are completely harmless. Although the files worked correctly, like any other Excel document, experts explain that cybercriminals store malware in them using a custom VBA code format, which is also password protected so that security systems and information security specialists cannot analyze the content.

Analysts point out that using EPPlus not only helped, but also hurt Epic Manchego. The fact is that experts were able to detect numerous past grouping operations by simply looking for unusual Excel files. Como resultado, más que 200 files related to Epic Manchego were discovered, the first of which dates back to June 22 de este año.

Hackers use .NET library

Como puedes adivinar, such malicious documents contain malware’s macro script. Por ejemplo, if the victim opens the Excel file and allows execution of the script, the macros will download and install malware on their machine.
Payloads in this case are classic infostealer Trojans such as Azorult, AgenteTesla, Formbook, Matiex and njRat, which steal passwords from browsers, mail and FTP clients and send them to Epic Machengo servers.

Cabe resaltar que, en general, NVISO Labs experts were not surprised that the hack group was using EPPlus for attacks. They write:

«We have been familiar with this .NET library for a long time, as we have been using it for several years to create malicious documents for our red team and pentesters»

Not only Excel users are under attack, I recently wrote that hackers use in attacks malicious plugin for 3Ds Max, e incluso hackers force users to solve CAPTCHA.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *