Trend Micro researchers have come across a 64-bit version of Havex, a remote access tool (RAT) that has been used in cyber espionage campaigns aimed at industrial control systems (ICS).
According to the security firm, while the 64-bit Havex has only been spotted recently, it has been around for quite some time.
In the campaign known as Dragonfly (Energetic Bear/Crouching Yeti), the threat actors appeared to be using only a 32-bit version of Havex since most of the systems they targeted ran the outdated Windows XP operating system. However, researchers at Trend Micro have spotted two Windows 7 infections in which the 64-bit version of the threat had been used.
One of the files observed in the infection is TMPpovider023.dll (BKDR64_HAVEX.A), a component responsible for command and control (C&C) server instructions for downloading files and executing commands.
The “23” in the file name represents the version of Havex. The file in question was initially compiled in October 2012 and designed to run on 64-bit operating systems. In version 29 of the malware, the 64-bit file was upgraded to a 32-bit Havex, experts said.
“The compile time of TMPprovider023.dll (v023) is earlier than any of the three other files, indicating that the 64-bit file pre-dates the other 32-bit files in this infection. In fact, standalone execution of the 32-bit module results to a file called TMPprovider029.dll, which definitely is v029 of the HAVEX RAT,” Trend Micro explained in a blog post.
Versions 23 and 29 of Havex appear to use the same infrastructure since they both communicate with the same C&C server. Researchers say there are currently four IP addresses communicating with the C&C server.
In one of the infections spotted by Trend Micro, some of the malicious files, detected as BKDR_HAVEX.SM, were signed with a digital certificate in an effort to make them look like legitimate software. The digital certificate appeared to be signed by IBM, but in reality it was self-signed by the malware authors.
“While the HAVEX RAT has gone through several iterations—used in campaigns with ICS/SCADA and even pharmaceutical targets, nothing prevents it from being used again and again,” Trend Micro said. “ICS operators have to take note that the structure of the HAVEX binaries resemble much of what we see in common Windows malware – more so now that we’ve seen Windows 7 64-bit infections. It is thereby important to validate software being installed on endpoints within the environment, and to frequently monitor HTTP traffic.”
Havex and the Energetic Bear campaign were recently mentioned in an IT security report published by Germany’s Federal Office for Information Security (BSI). According to the government agency, several German companies have been targeted in the cyber espionage operation.