SambaSpy Malware Campaign Targets Italian Users with Precision

On September 18, 2024, GREAT research team released a report on a campaign identified in May 2024, where a highly targeted malware campaign exclusively aimed at Italian users was uncovered by the Global Research & Analysis Team (GReAT).

SambaSpy Malware Campaign Targets Italian Users with Precision
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (September 2024)

On September 18, 2024, GREAT research team released a report on a campaign identified in May 2024, where a highly targeted malware campaign exclusively aimed at Italian users was uncovered by the Global Research & Analysis Team (GReAT). Unlike typical cybercriminal efforts, which often cast a wide net across multiple countries to maximize profits, this campaign stood out due to its deliberate focus on Italy, with the attackers going to great lengths to ensure that only Italian systems were infected. The campaign, delivering a Remote Access Trojan (RAT) dubbed SambaSpy, highlights a new trend in precision-targeted cybercrime, adding a notable element of sophistication.

Introduction

Investigations revealed two variations of the infection chain, but the more elaborate second variant involved the use of phishing emails crafted to appear as though they originated from a legitimate Italian real estate company. These emails, written in Italian, directed recipients to click on a link to view an invoice. This link redirected victims to FattureInCloud, a legitimate Italian service used for managing digital invoices. However, users with their browser language set to Italian were then redirected to a malicious server running on the ngrok platform, leading them down the path of infection.

The malware's design was methodical, ensuring that only Italian systems were compromised by performing multiple checks. It first verified the user's browser language and browser type, with the infection proceeding only if conditions were met (i.e., if the user was running Edge, Chrome, or Firefox with their language set to Italian). Users who met the criteria were then taken to a OneDrive-hosted PDF document, which contained a malicious link leading to a JAR file hosted on MediaFire.

This JAR file, which served as a downloader or dropper, executed additional checks to ensure it was running on an Italian system before downloading the final payload — SambaSpy.

Report Overview

SambaSpy, written in Java and obfuscated using the Zelix KlassMaster protector, is a full-featured RAT capable of performing a wide range of malicious activities. Key functionalities include:

  • File system and process management
  • Webcam control and screenshot capturing
  • Keystroke logging
  • Password theft from major browsers (Chrome, Edge, Opera, Brave, and others)
  • Remote desktop control

SambaSpy also includes a plugin-loading mechanism, allowing the RAT to extend its capabilities by downloading additional malware or tools as needed. The RAT’s focus on hiding its operations through advanced obfuscation techniques makes it challenging for security tools to detect and analyze.

While the precise identity of the threat actors behind this campaign remains unknown, several indicators point to a Brazilian-Portuguese-speaking group. Comments and error messages within the malware were written in Brazilian Portuguese, and there is evidence that the attackers have launched similar campaigns targeting users in Brazil and Spain.

Interestingly, this campaign relied heavily on repurposing legitimate resources, such as the FattureInCloud service and the brand of the Italian real estate company. Over a dozen malicious domains were registered by the attackers, mimicking the legitimate company’s domain name to lend credibility to their phishing emails.

Insights and Analysis

This campaign highlights the increasing sophistication of modern cybercriminals, particularly in their ability to craft malware that targets victims based on specific geographic and language criteria. The Italian focus is particularly noteworthy, as the attackers tailored their phishing emails, redirections, and malware checks to ensure that only Italian users were affected.

Preventative Measures:

  1. User Awareness: Organizations should raise awareness about the specific tactics used in this campaign, such as phishing emails and legitimate-looking redirections.
  2. Language-Specific Threat Detection: Security solutions should be configured to monitor for suspicious activity based on language settings, particularly for users in targeted regions.
  3. Patch and Update Systems: Regularly updating software and using security patches can prevent many vulnerabilities from being exploited by attackers.
  4. Reviewing Suspicious Links: Users should be encouraged to review URLs carefully, especially when dealing with invoices or documents from unfamiliar sources.

This campaign serves as a reminder of the need for region-specific defenses and the growing importance of detecting geographically targeted cyberattacks. Staying informed about these emerging trends is critical in protecting individuals and organizations from sophisticated threats like SambaSpy.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
e6be6bc2f8e27631a7bfd2e3f06494aaFile HashMalicious PDF file
1ec21bd711b491ad47d5c2ef71ff1a10File HashDownloader associated with SambaSpy campaign
d153006e00884edf7d48b9fe05d83cb4File HashDropper used in the infection chain
0f3b46d496bbf47e8a2485f794132b48File HashSambaSpy RAT
hxxps://1drv[.]ms/b/s!AnMKZoF8QfODa92x201yr0GDysk?e=ZnX3RmURLMalicious OneDrive URL hosting the PDF
belliniepecuniaimmobili[.]comDomain NameDomain used to distribute malware
immobilibelliniepecunia[.]xyzDomain NameDomain used to distribute malware
immobilibelliniepecunia[.]onlineDomain NameDomain used to distribute malware
bpecuniaimmobili[.]infoDomain NameDomain used to distribute malware

MITRE ATT&CK TTPs

TacticTechniqueIDDescription
Initial AccessPhishing: Spearphishing AttachmentT1566.001Attackers used phishing emails with malicious links to gain access
ExecutionUser Execution: Malicious FileT1204.002The campaign relied on users clicking malicious links to trigger infection
Defense EvasionObfuscated Files or InformationT1027SambaSpy was obfuscated using Zelix KlassMaster to avoid detection
CollectionInput Capture: KeyloggingT1056.001SambaSpy logged keystrokes using the JNativeHook library
CollectionClipboard DataT1115SambaSpy stole clipboard data
Credential AccessCredentials from Web BrowsersT1555.003SambaSpy stole credentials from major browsers
Command and ControlApplication Layer ProtocolT1071.001Communication with Command and Control (C2) via HTTP-based protocols
Remote ControlRemote Desktop ProtocolT1021.001SambaSpy used custom remote desktop control to manage victim systems

References

SambaSpy – a new RAT targeting Italian users
Kaspersky researchers detected a campaign exclusively targeting Italian users by delivering a new RAT dubbed SambaSpy