BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar RAT

A resurgence of activity by BlindEagle, a South American-focused APT actor, also known as APT-C-36. BlindEagle has a history of targeting individuals and organizations, particularly within the government and financial sectors of Colombia and Ecuador.

BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar RAT
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

Introduction

On September 5 2024, Zscaler’s ThreatLabz reported a resurgence of activity by BlindEagle, a South American-focused advanced persistent threat (APT) actor, also known as APT-C-36 or AguilaCiega. BlindEagle has a history of targeting individuals and organizations, particularly within the government and financial sectors of Colombia and Ecuador. In this recent campaign, BlindEagle directed its efforts towards the Colombian insurance sector, deploying a heavily obfuscated variant of the Quasar RAT, dubbed BlotchyQuasar, to steal sensitive payment-related data.

Report Overview

BlindEagle’s activities were initially detected in June 2024 when phishing emails, impersonating Colombia's tax authority, Dirección de Impuestos y Aduanas Nacionales (DIAN), were sent to employees in the Colombian insurance sector. The emails falsely claimed that the recipients were subject to seizure orders due to unpaid taxes. This social engineering technique, designed to invoke urgency, is characteristic of BlindEagle’s operations.

The phishing attack chain begins with a malicious email that includes a PDF attachment and a download URL leading to a password-protected ZIP archive. The ZIP archive is hosted on a Google Drive folder associated with a compromised Colombian government account. Within the ZIP archive, victims find an executable file: BlotchyQuasar RAT.

BlotchyQuasar is a heavily obfuscated Remote Access Trojan (RAT) based on QuasarRAT, with multi-layer encryption and custom XOR-based algorithms used to conceal its payload. Once executed, the RAT decrypts its command-and-control (C2) domain from a Pastebin link. BlotchyQuasar is equipped with keylogging capabilities, window monitoring, and the ability to steal credentials from browsers like Chrome, Firefox, and FileZilla FTP client.

The BlotchyQuasar malware enables BlindEagle to monitor and log interactions with specific financial services, primarily targeting users in Colombia’s banking sector. By logging keystrokes and stealing credentials, the RAT allows attackers to potentially drain accounts or compromise sensitive financial information. The RAT’s ability to establish persistent C2 communication, exfiltrate data, and its use of dynamic DNS services for infrastructure make it a persistent threat to organizations and individuals in Colombia’s insurance and financial industries.

Insights and Analysis

Zscaler’s ThreatLabz analysis highlights the obfuscation techniques used to make BlotchyQuasar challenging to detect and analyze. The C2 domain, decrypted using 3DES encryption from a Pastebin link, allows BlindEagle to dynamically control their malware operations and adjust targets as needed. The targeting of Colombian and Ecuadorian financial institutions strongly suggests a focused campaign aimed at gaining illicit access to payment systems and financial accounts.

This BlindEagle campaign demonstrates the increasing sophistication of phishing attacks aimed at financial sectors in South America. Organizations must remain vigilant against such threats by ensuring robust email filtering, employee education, and implementing multi-factor authentication to mitigate the risk of credential theft.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
b83f6c57aa04dab955fadcef6e1f4139MD5Hash of BlotchyQuasar sample
ec2dd6753e42f0e0b173a98f074aa41d2640390c163ae77999eb6c10ff7e2ebdSHA256Hash of BlotchyQuasar sample
edificiobaldeares.linkpc[.]netDomainBlotchyQuasar C2 domain
equipo.linkpc[.]netDomainAdditional BlotchyQuasar C2 domain
perfect5.publicvm[.]comDomainAdditional BlotchyQuasar C2 domain
perfect8.publicvm[.]comDomainAdditional BlotchyQuasar C2 domain

MITRE ATT&CK Techniques

TacticTechniqueIDDescription
Initial AccessPhishing: Spearphishing LinkT1566.002BlindEagle sent phishing emails with malicious links to gain initial access
ExecutionUser Execution: Malicious FileT1204.002Victims manually executed the BlotchyQuasar sample from the ZIP archive
ExecutionUser Execution: Malicious LinkT1204.001Victims clicked on the malicious link included in the phishing email
PersistenceBoot or Logon Autostart ExecutionT1547.001BlotchyQuasar achieves persistence by setting a registry RunKey
Defense EvasionObfuscated Files or InformationT1027.002BlotchyQuasar used software packing and multiple layers of encryption
Defense EvasionImpair Defenses: Disable or Modify ToolsT1562.001BlotchyQuasar attempts to disable Windows Defender features
CollectionInput Capture: KeyloggingT1056.001BlotchyQuasar logs keystrokes from the infected system
Command and ControlNon-Application Layer ProtocolT1095BlotchyQuasar communicates over a socket-based C2 channel
ExfiltrationExfiltration Over C2 ChannelT1041BlotchyQuasar exfiltrates stolen information over the C2 channel

References

BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
BlindEagle is targeting the Colombian insurance sector with BlotchyQuasar variant. Capabilities include keylogging, monitoring bank services, & stealing information.