New Polyglot Malware Targets Aviation and Satellite Communication Firms

A new polyglot malware, Sosano, targets aviation and satellite communication firms in the UAE, enabling remote command execution and persistent access on infected devices.
New Polyglot Malware Targets Aviation and Satellite Communication Firms
Table of Contents
    Add a header to begin generating the table of contents

    A new form of polyglot malware has emerged, specifically targeting aviation, satellite communication, and critical transportation organizations in the United Arab Emirates. This malware, identified as Sosano, facilitates remote command execution and establishes persistence on infected devices.

    Polyglot Malware Used by Threat Actor UNK_CraftyCamel

    The malware was discovered by security researchers at Proofpoint in October 2024. They linked the attacks to a threat actor known as ‘UNK_CraftyCamel.’ While the operation remains limited in scale, researchers emphasize its sophistication and potential danger to the targeted industries.

    Technical Overview of Polyglot Malware

    Polyglot malware is designed to contain multiple file formats within a single file. This unique structure allows it to be interpreted differently by various applications. For instance, a file can appear as a valid MSI (Windows installer) to Windows while being recognized as a JAR (Java archive) by Java runtime.

    This duality enables attackers to stealthily deliver malicious payloads, often evading detection by security software that typically analyzes files based on a single format.

    Infection Methodology Polyglot

    The campaign begins with a tailored spear-phishing email sent from a compromised Indian electronics company, INDIC Electronics. Victims receive emails containing malicious URLs that direct them to a spoofed domain, indicelectronics[.]net. Here, they are prompted to download a ZIP archive titled “OrderList.zip.”

    Inside the ZIP archive, a Windows shortcut file disguised as an XLS document is present, along with two PDFs: “about-indic.pdf” and “electronica-2024.pdf.” Notably, these PDFs are polyglot files, containing both legitimate and malicious structures.

    • First PDF: Contains HTA (HTML Application) code.
    • Second PDF: Includes a hidden ZIP archive.

    PDF lures used in the attacks
    Source: Proofpoint

    This design allows the malware to evade detection, as most security tools will only inspect the first file format, which appears harmless.

    Execution and Payload Delivery

    When the LNK file is executed, it triggers cmd.exe to launch mshta.exe, which then executes the HTA script embedded within the first PDF.

    Polyglot Malware Payload Delivery

    HTA portion in the PDF file
    Source: Proofpoint

    This action leads to the activation of the second PDF, which contains a hidden archive that modifies the Windows Registry for persistence. The hidden archive also executes an XOR-encoded JPEG file that decodes a DLL payload, specifically “yourdllfinal.dll,” which is the Sosano backdoor.

    HTA portion in the PDF file
    Source: Proofpoint

    The Sosano Backdoor

    According to Proofpoint, Sosano is a Go-based payload that, despite its simplicity, has been bloated to 12MB to obscure its malicious code. Once activated, Sosano connects to its command-and-control (C2) server at bokhoreshonline[.]com and awaits further instructions, including:

    • File operations
    • Shell command executions
    • Fetching and launching additional payloads

    Defending Against Polyglot Malware

    To counter the threat posed by polyglot malware, enterprises must adopt a multifaceted approach. This includes:

    • Robust email scanning
    • User education
    • Security software capable of detecting multiple file formats within a single file
    • Blocking potentially dangerous file types such as LNKs, HTAs, and ZIPs at the email gateway is also recommended.

    Helpful Reads:

    Related Posts