New BLISTER Malware Using Code Signing Certificates to Evade Detection


Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security defenses and stay under the radar with the goal of deploying Cobalt Strike and BitRAT payloads on compromised systems.

The binary, a loader, has been dubbed “Blister” by researchers from Elastic Security, with the malware samples having negligible to zero detections on VirusTotal. As of writing, the infection vector used to stage the attack, as well as the ultimate objectives of the intrusion, remains unknown.

Automatic GitHub Backups

A notable aspect of the attacks is that they leverage a valid code signing certificate issued by Sectigo. The malware has been observed signed with the certificate in question dating back to September 15, 2021. Elastic said it reached out to the company to ensure that the abused certificates are revoked.

“Executables with valid code signing certificates are often scrutinized to a lesser degree than unsigned executables,” researchers Joe Desimone and Samir Bousseaden said. “Their use allows attackers to remain under the radar and evade detection for a longer period of time.”

Code Signing Certificates
Prevent Data Breaches

Blister masquerades as a legitimate library called “colorui.dll” and is delivered via a dropper named “dxpo8umrzrr1w6gm.exe.” Post execution, the loader is designed to sleep for 10 minutes, likely in an attempt to evade sandbox analysis, only to follow it up by establishing persistence and decrypting an embedded malware payload such as Cobalt Strike or BitRAT.

“Once decrypted, the embedded payload is loaded into the current process or injected into a newly spawned WerFault.exe [Windows Error Reporting] process,” the researchers noted. Additional indicators of compromise (IoCs) associated with the campaign can be accessed here.

Products You May Like

Articles You May Like

Mispadu Trojan Steals 90,000+ Banking Credentials From Latin American Victims
Over 2400 Fake Pages Found Targeting Job Seekers in Middle East, Africa
Pro-Russian Winter Vivern APT Targets Governments and Telecom Firm
THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
Firefox 111 patches 11 holes, but not 1 zero-day among them…

Leave a Reply

Your email address will not be published. Required fields are marked *