BlackWater
BlackWater is the name of a new, threatening backdoor disguised as a COVID-19 leaflet, which exploits the Cloudflare Workers environment to establish communication with its Command and Control server. The backdoor spreads in the form of a RAR archive, and the crooks behind it have named it “Important – COVID-19.rar.” The malware seems to be spreading via phishing emails, although the main infection vector has yet to be fully confirmed.
A Corrupted Executable Hidden behind an MS Word Document
When unzipped, the file looks like an innocuous MS Word Document called “Important – COVID-19.docx.” However, this is not its full name because file extensions are hidden by default, and this fil, in particular, contains an executable extension (.exe) after the .docx one. Since the executable remains invisible by default, an unsuspecting PC user is very likely to open what looks like an information leaflet on the most talked about topic in the world today.
If opened, the executable places an MS Word document in the user’s Downloads folder. The document, which now has not one but two .docx extensions, shows a text regarding the Coronavirus. This text is aimed to distract the readers, for another execution takes place at the same time. When the latter has ended, the victim gets a new file:
%UserProfile%\AppData\Local\Library SQL\bin\version 5.0\sqltuner.exe.
When launched, the sqltuner executable establishes a connection between the BlackWater backdoor nad an external C2 server, and this connection runs through a Cloudflare Worker directly. It is a novel threatening piece, which aims to evade security software by taking advantage of Cloudflare’s legit proxy IP.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.