BackConfig

Malware updated 4 months ago (2024-05-05T08:17:33.309Z)
Download STIX
Preview STIX
BackConfig is a custom trojan malware utilized by the Hangover threat group (also known as Neon, Viceroy Tiger, MONSOON) to target government and military organizations in South Asia. Its design features a flexible plug-in architecture that allows it to gather system information, keylog data, and even upload and execute additional payloads. The malware's delivery method often involves spear-phishing emails containing seemingly legitimate letters or government forms. These emails lure victims into browsing compromised websites that serve weaponized Excel documents, which install the BackConfig Trojan. The malware's execution flow is carefully coordinated, with the task scheduler executing the VBS downloader component and launching the BackConfig loader EXE only after 20 minutes, potentially evading analysis systems. The BackConfig malware cleverly uses benign operations, paths, and filenames in URL paths and file names for its delivery, making it harder to detect. Notably, Unit 42 has conducted binary diffing on many of the BackConfig executable files and found no overlaps with non-library functions, suggesting that the payloads are not based on existing frameworks such as YTY or EHDev. Additionally, the malware has evolved over time, employing various methods for command execution and payload deployment, both with and without obfuscation. Through thorough infrastructure analysis and metadata investigation, Unit 42 has managed to discover additional BackConfig PE executable samples. For instance, one BackConfig PE sample was found using the C2 domain matissues[.]com and was dropped by a weaponized Rich Text Format (RTF) file. However, there seems to be no evidence of weaponized documents being used to deliver BackConfig attached to phishing emails; instead, the Hangover group appears to prefer phishing URL links in emails as their primary mode of operation.
Description last updated: 2024-05-05T07:59:10.588Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the BackConfig Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
Updated BackConfig Malware Targeting Government and Military Organizations in South Asia