NoisyBear Exploits ZIP Files for PowerShell Loaders and Data Exfiltration


The threat actor known as NoisyBear has launched a sophisticated cyber-espionage effort called Operation BarrelFire, using specially designed phishing lures that imitate internal correspondence to target Kazakhstan’s energy sector, particularly workers of the state oil and gas major KazMunaiGas.

Security researchers at Seqrite Labs first observed the campaign in April 2025 and noted its rapid escalation by May.

Spear-Phishing Lure Mimics HR Notices

NoisyBear’s initial attack vector relied on a compromised finance department email at KazMunaiGas.

On May 15, 2025, employees received messages with the urgent subject line “URGENT! Review the updated salary schedule.”

The email body instructed recipients—in both Russian and Kazakh—to download and extract a ZIP file named График.zip (“Schedule.zip”) and then open a shortcut file, График зарплат.lnk (“Salary Schedule.lnk”), purportedly linking to updated salary policies.

The message created urgency by imposing a compliance deadline and even referenced the IT Support team to enhance legitimacy.

Under the hood, the ZIP archive contained three items: a decoy document bearing the KazMunaiGas logo, a README.txt with user instructions, and the malicious .LNK shortcut.

Once executed, the shortcut used Windows’ own PowerShell binary to download a batch script from a remote server at 77.239.125.41:8443, placing it into the “C:UsersPublic” folder and launching it automatically.

Multi-Stage Infection Chain Unveiled

Researchers dissected the infection chain across four distinct stages:

1. Batch Script Deployment

The initial batch downloader (123.bat and it.bat) fetched two PowerShell loader scripts—support.ps1 and a.ps1—from the attacker’s infrastructure.

Each script included a deliberate pause (10–11 seconds) before executing to evade sandbox environments.

2. AMSI Bypass and Loader Execution

The support.ps1 script leveraged .NET reflection to disable Windows’ Anti-Malware Scan Interface (AMSI) by flipping the internal amsiInitFailed flag, allowing subsequent payloads to load unchecked.

The second script dynamically resolved native Windows API functions for in-memory code execution, then injected Meterpreter reverse-shell shellcode into the explorer.exe process using CreateRemoteThread.

3. DLL Implant and Thread Hijacking

The final payload was a 64-bit DLL implant that enforced a single-instance mechanism via named semaphores and events.

It spawned a suspended rundll32.exe process, hijacked its thread context, allocated RWX memory, and injected a reverse shell payload before resuming execution.

4. Command-and-Control and Persistence

Once the reverse shell was established, NoisyBear’s operators could exfiltrate sensitive data—particularly employee credentials and internal documents—and potentially maintain long-term access to company networks.

    Seqrite’s threat hunters uncovered that NoisyBear’s infrastructure was hosted on servers under the sanctioned Russian hosting provider Aeza Group LLC.

    Further reconnaissance revealed additional malicious web applications masquerading as wellness and fitness sites, likely serving as alternate command-and-control hubs.

    Analysis of the tools and techniques—extensive use of PowerShell, reflective DLL injection, thread-context hijacking, dynamic API resolution, and Russian-language comments in scripts—aligns NoisyBear with known Russian-speaking cyber-espionage groups.

    Operational mistakes, such as reusing remote-hosting domains and shared shellcode stagers, strengthened the attribution.

    Defense Recommendations and Technical Indicators

    To guard against similar incursions, security teams should:

    • Enforce strict email filtering and attachment sandboxing, particularly for archive files containing executables or shortcuts.
    • Enable AMSI logging and block known LOLBIN (Living off the Land Binary) techniques.
    • Monitor for anomalous PowerShell processes invoking System.Management.Automation.AmsiUtils or reflective code-loading patterns.
    • Conduct regular threat hunting for named semaphores and events linked to unauthorized DLL injection.

    Seqrite Labs also published extensive Indicators of Compromise (IOCs), including file hashes for the ZIP, LNK, batch, PowerShell, and DLL stages, as well as NoisyBear’s C2 domains and IPs:

    With Central Asia’s energy sector increasingly under the microscope, organizations must remain vigilant and adopt layered defenses against highly customized, multi-stage intrusion efforts like Operation BarrelFire.

    Indicators of Compromise (IoCs):

    File-Based

    File-TypeSHA-256
    Outlook5168a1e22ee969db7cea0d3e9eb64db4a0c648eee43da8bacf4c7126f58f0386
    ZIP021b3d53fe113d014a9700488e31a6fb5e16cb02227de5309f6f93affa4515a6
    ZIPf5e7dc5149c453b98d05b73cad7ac1c42b381f72b6f7203546c789f4e750eb26
    LNKa40e7eb0cb176d2278c4ab02c4657f9034573ac83cee4cde38096028f243119c
    LNK26f009351f4c645ad4df3c1708f74ae2e5f8d22f3b0bbb4568347a2a72651bee
    Batch Scriptd48aeb6afcc5a3834b3e4ca9e0672b61f9d945dd41046c9aaf782382a6044f97
    Batch Script1eecfc1c607be3891e955846c7da70b0109db9f9fdf01de45916d3727bff96e0
    PowerShellda98b0cbcd784879ba38503946898d747ade08ace1d4f38d0fb966703e078bbf
    PowerShell6d6006eb2baa75712bfe867bf5e4f09288a7d860a4623a4176338993b9ddfb4b
    PowerShellfb0f7c35a58a02473f26aabea4f682e2e483db84b606db2eca36aa6c7e7d9cf8
    DLL1bfe65acbb9e509f80efcfe04b23daf31381e8b95a98112b81c9a080bdd65a2d

    Network-Based

    Domains / IPs
    77[.]239[.]125[.]41
    wellfitplan[.]ru
    178[.]159[.]94[.]8

    MITRE ATT&CK Mapping

    TacticTechnique IDName
    ReconnaissanceT1589.002Gather Victim Identity Information: Email Addresses
    Initial AccessT1204.002User Execution: Malicious File
    T1078.002Valid Accounts: Domain Accounts
    ExecutionT1059.001Command and Scripting Interpreter: PowerShell
    T1059.00Command and Scripting Interpreter
    Defense EvasionT1562Impair Defenses
    T1027.007Encrypted/Encoded File
    T1027.013Dynamic API Resolution
    T1055.003Thread Execution Hijacking
    T1620Reflective Code Loading
    T1218.011System Binary Proxy Execution: Rundll32
    Command and ControlT1105Ingress Tool Transfer
    ExfiltrationT1567.002Exfiltration to Cloud Storage

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.



Source link