Bateleur, the new malware backdoor targeting restaurant chains, from the makers of Carbanak

Malware served up to take screenshots and steal passwords.

David bisson
David Bisson

From the makers of Carbanak comes a new JScript backdoor

The developers of the notorious Carbanak banking trojan have added a new JavaScript backdoor to their tool set.

The new threat, dubbed “Bateleur”, appears to be targeting chain restaurants based in the United States. It arrives via malicious spam sent from either an or Gmail account that purports to contain a previously discussed check as its attachment. That document claims to be encrypted by “ Protect Service” or “Google Protect Service”.

Malicious “Outlook” document lure (left) and “Google” lure (right). (Source: Proofpoint)

In reality, it contains malicious macros that access the delimited obfuscated JavaScript payload from the caption “UserForm1.Label1.Caption”. The macros then save the JScript content as “debug.txt” to the user’s temporary folder before executing a series of commands.

Sign up to our free newsletter.
Security news, advice, and tips.
Screen shot 2017 08 03 at 9.23.06 am
Malicious macro sequence. (Source: Proofpoint)

Proofpoint’s Matthew Mesa and Darien Huss detail what this sequence of events produces:

“The macro creates a scheduled task whose purpose is to execute debug.txt as a JavaScript. The macro then sleeps for 3 seconds, after which it runs the scheduled task. Finally, the macro sleeps for 10 seconds then deletes the malicious scheduled task. The combined effect of these commands is to run Bateleur on the infected system in a roundabout manner in an attempt to evade detection.

After achieving persistence by creating a scheduled task, Bateleur can access information about the infected machine, take screenshots, steal passwords, and load EXEs and DLLs. In order to evade detection, it can even detect Virtualbox, VMware, and others as well as check its script and compare it to a deny-list including terms such as “malware” and “Desktop.”

At this point, Proofpoint’s researchers think Bateleur originates from Carbanak/FIN7, the same APT responsible for Odinaff and other malware. They base their attribution on some key pieces of evidence, like similar email messages used to deliver both Bateleur and another backdoor called “GGLDR” as well as both campaigns’ use of a Meterpreter downloader script called “Tinymet”.

Beginning snippet from Tinymet downloaded by Bateleur. (Source: Proofpoint)

Notwithstanding its expanding toolset, Carbanak relies on well-known attack vectors to deliver Bateleur, GGLDR, and other threats.

Organizations should therefore take this opportunity to begin educating their employees about phishing emails if they don’t already do so. They should also consider investing in email security solutions as additional layers of protection against social engineering attacks.

David Bisson is an infosec news junkie and security journalist. He works as Contributing Editor for Graham Cluley Security News and Associate Editor for Tripwire's "The State of Security" blog.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.