Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques

The article examines a malware variant associated with the SLOW#TEMPEST campaign, focusing on advanced obfuscation techniques used by the threat actors. The malware is distributed as an ISO file containing multiple files, including two malicious ones. The loader DLL, zlibwapi.dll, decrypts and executes the embedded payload, which is appended to another DLL. The analysis reveals sophisticated anti-analysis techniques, including Control Flow Graph (CFG) obfuscation using dynamic jumps and obfuscated function calls. The researchers demonstrate methods to counter these techniques using emulation and code patching. The loader DLL also employs an anti-sandbox check, only executing its payload if the target machine has at least 6 GB of RAM. The study highlights the importance of combining advanced dynamic analysis with static analysis to effectively understand and mitigate modern malware threats. Author: AlienVault

Related Tags:
slow#tempest

obfuscated function calls

dynamic jumps

T1027.004

anti-sandbox

T1553.002

emulation

T1497.001

anti-analysis

Associated Indicators:
A05882750F7CAAC48A5B5DDF4A1392AA704E6E584699FE915C6766306DAE72CC

3D3837EB69C3B072FDFC915468CBC8A83BB0DB7BABD5F7863BDF81213045023C