BlackSanta Malware Triggers EDR and AV Evasion Before Unleashing Payload
BlackSanta Malware Campaign Uncovered
A sophisticated malware campaign, likely originating from a Russian-speaking threat actor, has been uncovered.
Targeting Human Resources Departments
The campaign leverages social engineering tactics to trick victims into opening malicious attachments, specifically targeting the human resources (HR) department’s hiring process.
Malware Delivery and Execution
The malware, dubbed BlackSanta, is delivered via an ISO file containing four seemingly innocuous files. However, upon closer inspection, a security analyst would notice a suspicious 3KB PDF file and a PowerShell script.
System Information Collection and Payload Delivery
Once the script is executed, it collects basic system information, user, and host context by reading environment variables. This information is used to create a unique fingerprint string, providing the attacker with system and user context. Further payloads are delivered by the command and control (C2) server, which prepares the environment by exiting if it detects a Russian or CIS locale or language, a debugger, or a sandbox.
BlackSanta Component and Antivirus Evasion
The BlackSanta component is then injected, which enumerates running processes and compares each name against a hardcoded list of antivirus and EDR executables. When a match is found, it terminates the targeted process at the kernel level, bypassing standard protections.
