{"id":14560,"date":"2023-05-19T21:36:12","date_gmt":"2023-05-19T21:36:12","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=14560"},"modified":"2024-12-20T22:50:39","modified_gmt":"2024-12-20T22:50:39","slug":"ducktail-malware-analysis","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/ducktail-malware-analysis\/","title":{"rendered":"Ducktail Infostealer Malware Targeting Facebook Business Accounts"},"content":{"rendered":"<p>Researchers discovered Ducktail Malware, which targets individuals and organizations on the Facebook Business\/Ads platform. The malware steals browser cookies and uses authenticated Facebook sessions to access the victim&#8217;s account. As a result, <strong>the scammers gain access to Facebook Business through the victim&#8217;s account, which has sufficient access to do so<\/strong>. It is a particularly interesting behavior, as most stealer malware aims at cryptocurrency-related data, or even all data types at once.<\/p>\n<h2>What is Ducktail Malware?<\/h2>\n<p>Ducktail is malware built on .NET Core that predominantly targets individuals and employees who may have access to a Facebook Business account. The Ducktail campaign is believed to have been active since 2018. However, the author became actively involved in developing and distributing malware related to the DUCKTAIL operation in the second half of 2021. The chain of evidence suggests that <strong>the attacker&#8217;s motives are driven by financial considerations<\/strong> and that the cybercriminal behind the campaign hails from Vietnam.<\/p>\n<p>As mentioned at the outset, the primary targets of this stealer were individuals who hold <strong>senior positions in clothing, footwear, and cosmetics companies, as well as employees involved in digital marketing, digital media, and human resources<\/strong>. However, the author is believed to have recently updated the malware, expanding its capabilities. The new version of Ducktail is written in PHP. Now it targets users <strong>with any level of access to Facebook Business accounts<\/strong>.<\/p>\n<h2>How does it work?<\/h2>\n<p>The Ducktail malware is specifically designed to extract browser cookies and use social media sessions. In this way, the attacker obtains sensitive information from the victim&#8217;s social media accounts and over Social Media Business accounts respectively. <strong>The scammers then use the access to place advertisements for financial gain<\/strong>. We will now look at this process in more detail.<\/p>\n<figure id=\"attachment_14598\" aria-describedby=\"caption-attachment-14598\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/GS_Blog_how-Ducktail-works.webp\" alt=\"How does Ducktail work?\" width=\"790\" height=\"778\" class=\"size-full wp-image-14598\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/GS_Blog_how-Ducktail-works.webp 790w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/GS_Blog_how-Ducktail-works-300x295.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/GS_Blog_how-Ducktail-works-768x756.webp 768w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-14598\" class=\"wp-caption-text\">Ducktail&#8217;s algorithm of actions in one picture<\/figcaption><\/figure>\n<h3>Delivery<\/h3>\n<p>To infect a target device, attackers use <a href=\"https:\/\/gridinsoft.com\/social-engineering\">time-tested social engineering<\/a>. I have repeatedly mentioned that the weakest link in any defense is the human factor, so this tactic will always be relevant. First, <strong>scammers place a malicious file on popular cloud storage<\/strong>. They typically use Google Drive, OneDrive, Mega, MediaFire, Discord, Trello, iCloud, and Dropbox. Next, they trick the victim into downloading and opening the malicious file. To do this, <a href=\"https:\/\/gridinsoft.com\/blogs\/online-scams-sings\/\">hackers contact the victim via social networks<\/a>, and send a link to the archive.  To make it look more legitimate, they pick a name like &#8220;Project Information And Salary Details At AVALON ORGANICS.zip&#8221;. Consequently, no suspicion is raised by the victim.<\/p>\n<figure id=\"attachment_14603\" aria-describedby=\"caption-attachment-14603\" style=\"width: 802px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/archive-contents.webp\" alt=\"Archive contents\" width=\"802\" height=\"583\" class=\"size-full wp-image-14603\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/archive-contents.webp 802w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/archive-contents-300x218.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/archive-contents-768x558.webp 768w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><figcaption id=\"caption-attachment-14603\" class=\"wp-caption-text\">The same file that is not who it says it is<\/figcaption><\/figure>\n<p>Inside the archive, there may be some thematic images (e.g., images of cosmetics, if it is a cosmetics company) and PDF or PDF document files. In reality, however, <a href=\"https:\/\/gridinsoft.com\/virus\">these are executable files disguised as documents<\/a>, as can be seen <strong>by checking the file extension<\/strong>. These files are actual payloads \u2013 .NET assemblies that carry both executable sections and DLLs in it.<\/p>\n<h3>Info Stealing<\/h3>\n<p>Once launched, Ducktail scans web browsers, mainly <strong>Google Chrome, Mozilla Firefox, Microsoft Edge, and Brave Browser<\/strong>. The malware extracts all stored cookies as well as access tokens. It is also interested in information such as name, user ID, email address, and date of birth from the victim&#8217;s Facebook account. The malware scans registry data in <strong>HKLM\\SOFTWARE\\WOW6432Node\\Clients\\StartMenuInternet<\/strong> to get each installed browser&#8217;s name, path, and icon path.<\/p>\n<h3>Hacking process<\/h3>\n<p>Ducktail uses the victim&#8217;s social media session cookie and other security credentials obtained. This allows it <strong>to interact directly with other social media endpoints from the victim&#8217;s computer<\/strong>, extracting information from the victim&#8217;s social media account. In addition, <strong>the malware checks for two-factor authentication and, if positive, tries to obtain recovery codes<\/strong>. It can also steal access tokens, IP addresses, and user agents, data from commercial and advertising accounts connected to the victim&#8217;s personal account. This allows attackers to hijack these accounts and <a href=\"https:\/\/www.facebook.com\/business\/help\/442345745885606\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">add their email addresses<\/a> to gain admin and financial editor access.<\/p>\n<p>While the former is self-explanatory, administrator rights give complete control over the Facebook Business account. Financial editor rights allow <strong>the change of credit card information and financial details of the business<\/strong>, such as transactions, bills, account charges, and payment methods. Because Ducktail accesses this information by sending requests from the victim&#8217;s computer, he impersonates a legitimate user and his session. This is achieved by masking its activity behind <a href=\"https:\/\/gridinsoft.com\/ip-address\">the victim&#8217;s IP address<\/a>, cookie values, and system configuration. In addition to the data obtained, the malware attempts to get data from the Facebook Business page the following information:<\/p>\n<ul>\n<li>Payment initiated<\/li>\n<li>Payment required<\/li>\n<li>Verification Status<\/li>\n<li>Owner ad accounts<\/li>\n<li>Amount spent<\/li>\n<li>Currency details<\/li>\n<li>Account status<\/li>\n<li>Ads Payment cycle<\/li>\n<li>Funding source<\/li>\n<li>Payment method [ credit card, debit card, etc.]<\/li>\n<li>Paypal Payment method [email address]<\/li>\n<li>Owned pages.<\/li>\n<\/ul>\n<h3>Exfiltration<\/h3>\n<p><a href=\"https:\/\/gridinsoft.com\/command-and-control\">As C&#038;C server,<\/a> Ducktail uses Telegram messenger as a channel. Fraudsters use <strong>Telegram.Bot client library<\/strong> makes it easy to upload a file to a chat with a Telegram bot. Finally, the malware runs an infinite loop in the background, establishing a continuous exfiltration process.<\/p>\n<h2>How to protect yourself?<\/h2>\n<p>Ducktail is a narrowly targeted information thief that can have severe <strong>financial losses and identity theft<\/strong>. Its authors constantly make changes and improve delivery mechanisms and approaches to steal sensitive user information. However, the following tips can help you keep the chances of infection to a minimum:<\/p>\n<ul>\n<li>Only download applications from trusted sources. Please avoid URLs that may be used to spread malware, <a href=\"https:\/\/gridinsoft.com\/blogs\/torrenting-is-it-legal\/\">like Torrent or Warez<\/a>.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/blogs\/use-strong-passwords-to-cant-be-hacked\/\">Use strong passwords<\/a> and remember to update them regularly.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/mfa\">Enable multi-factor authentication<\/a> whenever possible.<\/li>\n<li>Use <a href=\"https:\/\/gridinsoft.com\/antimalware\">reliable antivirus and internet security software<\/a> on all your devices, such as your PC, laptop, and workplace PC.<\/li>\n<li>Avoid opening links and email attachments unless you can verify their authenticity.<\/li>\n<li>Keep an eye on the network beacon to prevent data exfiltration by malware or TAs.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/blogs\/data-loss-prevention\/\">Consider enabling Data Loss Prevention<\/a> (DLP) solutions on your employees&#8217; systems.<\/li>\n<\/ul>\n<h2>Ducktail IoCs<\/h2>\n<p><Hashes<\/h3>\n<pre>\r\n<strong>MD5:<\/strong>691ca596a4bc5f3e77494239fb614093\r\n<strong>MD5:<\/strong>618072b66529c1a3d8826b2185048790\r\n<strong>MD5:<\/strong>b4125e56a96e71086467f0938dd6a606\r\n<\/pre>\n<pre>\r\n<strong>SHA1:<\/strong>20f53032749037caa91d4b15030c2f763e66c14e\r\n<strong>SHA1:<\/strong>936139fc7f302e3895f6aea0052864a6cb130c59\r\n<strong>SHA1:<\/strong>e692a626c6236332bd659abbd4b1479b860bf84a\r\n<\/pre>\n<pre>\r\n<strong>SHA256:<\/strong>f024e7b619d3d6e5759e9375ad50798eb64d1d4601f22027f51289d32f6dc0ca\r\n<strong>SHA256:<\/strong>2650e6160606af57bd0598c393042f60c65e453f91cde5ecc3d0040a4d91214d\r\n<strong>SHA256:<\/strong>385600d3fa3b108249273ca5fe77ca4872dee7d26ce8b46fe955047f164888e7\r\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Researchers discovered Ducktail Malware, which targets individuals and organizations on the Facebook Business\/Ads platform. The malware steals browser cookies and uses authenticated Facebook sessions to access the victim&#8217;s account. As a result, the scammers gain access to Facebook Business through the victim&#8217;s account, which has sufficient access to do so. It is a particularly interesting [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":14590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[4,17],"tags":[12,28,48,1360],"class_list":{"0":"post-14560","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips-tricks","8":"category-labs","9":"tag-facebook","10":"tag-malware","11":"tag-spyware","12":"tag-stealer"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/05\/GS_Blog_banner_Ducktail-Malware-Focuses-on-Targeting-HR-and-Marketing-Professionals.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=14560"}],"version-history":[{"count":47,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14560\/revisions"}],"predecessor-version":[{"id":28850,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/14560\/revisions\/28850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/14590"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=14560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=14560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=14560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}