The code used by this threat actor is copy-pasted from various online forums. In active victim systems, Patchwork immediately searches for and uploads documents to their C&C, and only if the target is deemed valuable enough, proceeds to install a more advanced second stage malware.

It is impossible to reach clear attribution from the information available. Cymmetria included an attribution section in this document to document their research efforts in this regard.

It is the first targeted threat Cymmetria captured using a commercial deception product. According to their report, they were able to catch the threat actor’s second stage toolset, as well as lateral movement activity.

The full report can be found here:  https://cymmetria.com/patchwork-targeted-attack/

All of the IOCs for this report can be found in Cymmetria's GitHub repository. The IOCs are provided in CSV and STIX formats:

https://github.com/CymmetriaResearch/CymmetriaResearch/tree/master/Patchwork

https://github.com/CymmetriaResearch/CymmetriaResearch/blob/c9cc70219fc5104be6fb5874a13b287f92e7977f/Patchwork/IOCs/IOCs.csv

Leave your comments

Post comment as a guest

0
Your comments are subjected to administrator's moderation.
terms and condition.
  • No comments found