Voltron STA

The curious case of 0xFancyFilter

 

voltron.png

The Work of Cyber in

the

Age of Mechanical Reproduction

This talk covers the interesting case of ‘0xFancyFilter’, an amalgam between what could be referred to as Regin 1.5 and Equation Group’s MISTYVEAL. This rare piece of malware is the only documented instance of code overlap between the Regin and Equation Group frameworks and is used to illustrate the difference between stating a relationship between threat actors from public documents vs. being able to show that relationship based on technical findings. The rare –but not at all surprising– collaboration is dubbed the Voltron Supra Threat Actor (STA) as suggested early on by a friendly researcher.

fvey.jpeg

Technical Indicators

In lieu of a proper write up, the following hashes should help replicate the work by any interested researchers. All samples discussed are available on VirusTotal :)

0xFancyFilter or Regin 1.5 (‘htmlfiltxx64.dll’ or ‘Microsoft\Internet Explorer\iesrch32.dat’)

  • cd3ee807e349abae65d93e421176f302528b739e9e1d77a6ce4e57caeec91b4e

Older 0xFF samples (‘httpfilt.dll’, ‘htmlfilt.dll’)

  • 369145c6f366f25a4e8878ad1ffec73d680cdc2da4380b221d1d7cdf3a90c930

  • ef35705696d78cc9f4de6adad2cbe5ed22fd50da0ce4180c1d47cf0536aebc87

  • df4bc387181ffaabe0be39e66ef5eb838ed638e0ae2b82e9a7daa83647e38bb1

Old EQGRP ‘nethdlr’ (MISTYVEAL) for comparison

  • d8bab0b79bafec3a41db0dd4ae1703c2ab55de5af261e1881d62bde0d9033690

Regin’s Hopscotch with shared RC4 implementation

  • d83428779b0c0ebfa08c6b50f34e0f1ae7812eeb9ed78b86610517d8208b6cb3

YARA

  • A broad YARA rule focused on 0xFF features is available HERE

Previous
Previous

Blackhat 2022: Modified Elephant

Next
Next

HackerHunter: Olympic Destroyer