Threat Database Malware PowerModul Implant

PowerModul Implant

The threat actor known as Paper Werewolf—also referred to as GOFFEE—has been exclusively targeting Russian organizations using a new implant called PowerModul. Between July and December 2024, their attacks zeroed in on key industries, including mass media, telecommunications, construction, government entities, and the energy sector.

A Persistent Adversary: Campaigns Since 2022

The Paper Werewolf has carried out at least seven campaigns since 2022. The group's consistent focus has been on high-value targets within the government, energy, financial, and media sectors.

More than Espionage: Destructive Twists in Attack Chains

Paper Werewolf's operations go beyond traditional cyber espionage. Their attack chains have been observed incorporating disruptive components, such as changing employee account passwords, indicating an intent to cripple operations and not just steal data.

Entry Point: Phishing Lures and PowerRAT

The attacks typically begin with phishing emails containing macro-laced documents. Once the victim accesses the file and enables macros, a PowerShell-based remote access Trojan known as PowerRAT is deployed. This malware sets the stage for more advanced payloads.

Custom Malware Arsenal: PowerTaskel, QwakMyAgent and Owowa

The next-stage payloads often include PowerTaskel and QwakMyAgent, custom versions of agents based on the Mythic framework. Another tool, Owowa, a malicious IIS module, is used to steal Microsoft Outlook credentials entered through web clients.

New Infection Tactic: Disguised Executables in RAR Archives

The latest wave of attacks features a malicious RAR archive containing an executable disguised as a PDF or Word document using double extensions (e.g., *.pdf.exe). Upon execution, a decoy document is shown to the user while the system is silently infected in the background.

The executable is actually a patched Windows system file (like explorer.exe), embedded with malicious shellcode containing an obfuscated Mythic agent, which connects to the C2 server for further instructions.

Alternate Attack Route: PowerModul Takes Center Stage

In an alternate method, Paper Werewolf uses a RAR archive with a macro-laced Office document that acts as a dropper for PowerModul. This PowerShell script can execute additional scripts from the C2 server, making it a versatile backdoor.

Payload Parade: A Toolkit for Espionage and Infection

PowerModul has been in use since early 2024, primarily to download and run PowerTaskel. Other notable payloads include:

  • FlashFileGrabber: Steals files from flash drives and exfiltrates them.
  • FlashFileGrabberOffline: Searches for files with specific extensions on flash media and stores them locally for later exfiltration.
  • USB Worm: Infects flash drives with a copy of PowerModul to spread the malware further.

PowerTaskel’s Capabilities: More than Just Script Execution

While similar to PowerModul, PowerTaskel is more capable. It sends a 'checkin' message with system info, runs commands from the C2 server, and can escalate privileges using PsExec. In one case, it was seen executing a FolderFileGrabber script that collects files from remote systems using hardcoded SMB network paths.

Evolution in Tactics: Shifting Away from PowerTaskel

For the first time, Paper Werewolf has used fraudulent Word documents with VBA scripts for initial access. Recent findings also indicate a tactical shift, with the group moving away from PowerTaskel and increasingly relying on binary Mythic agents for lateral movement within targeted networks.

Final Thoughts: A Growing Threat with Evolving Techniques

Paper Werewolf continues to refine its techniques and expand its arsenal. The exclusive focus on Russian entities, combined with disruptive capabilities and an evolving infection strategy, makes it a serious and persistent cyber threat on the horizon.

Trending

Most Viewed

Loading...