A Cereal Offender: Analyzing the CORNFLAKE.V3 Backdoor

This analysis details a campaign involving two threat groups, UNC5518 and UNC5774, deploying the CORNFLAKE.V3 backdoor. UNC5518 compromises legitimate websites to serve fake CAPTCHA pages, luring visitors to execute a downloader script. UNC5774 then uses this access to deploy CORNFLAKE.V3, a sophisticated backdoor with variants in JavaScript and PHP. The malware collects system information, establishes persistence, and can execute various payloads including shell commands, executables, and DLLs. It communicates with command and control servers using HTTP and can abuse Cloudflare Tunnels for traffic proxying. The campaign also involves active directory reconnaissance and credential harvesting attempts via Kerberoasting. Author: AlienVault

Related Tags:
WINDYTWIST.SEA

CORNFLAKE.V3

T1552.006

node.js

clickfix

T1059.007

T1003.008

T1547.001

T1059.001

Associated Indicators:
14F9FBBF7E82888BDC9C314872BF0509835A464D1F03CD8E1A629D0C4D268B0C

000B24076CAE8DBB00B46BB59188A0DA5A940E325EAAC7D86854006EC071AC5B

290CD148ED2F4995F099B7370437509B

chcp.com

windows-msg-as.live

dnsmicrosoftds-data.com

http://dnsmicrosoftds-data.com/log/out

http://windows-msg-as.live/qwV1jxQ

177.136.225.135