🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Read More
Cybercriminals are increasingly targeting YouTube creators by exploiting fake brand collaboration offers to distribute malware. These sophisticated phishing campaigns involve carefully crafted emails that impersonate trusted brands, presenting enticing partnership deals. The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection. Once downloaded, the malware can steal sensitive information, including login credentials and financial data, while also granting attackers remote access to the victim’s systems. With content creators and marketers as primary targets, this global campaign underscores the importance of verifying collaboration requests and adopting robust cybersecurity measures to protect against such threats.
This report highlights a sophisticated malware campaign targeting businesses through email phishing. The attackers are leveraging trusted brand names and professional collaboration offers as a cover to distribute malicious attachments. The email subject lines and contents are carefully crafted to appear as legitimate business opportunities, including promotions, partnership proposals, and marketing collaborations.
Key characteristics of the campaign include:
Cloudsek's threat researcher team has uncovered a malware campaign in which threat actors impersonate popular brands and their professional collaboration offers as a disguise to distribute malicious attachments. In the email below, the threat actor presents a brand collaboration proposal from, including a compensation structure based on subscriber count.
At the end of the email, the threat actor includes instructions and a OneDrive link to access a zip file containing the agreement and promotional materials, secured with the password.
When the YouTube victim clicked the URL in the email, they were directed to a Drive page. Further inspection revealed the Drive owner’s email, “[email protected],” and a creation date of 08/15/2024 for the OneDrive account.
Malicious payload is embedded within two compressed files. This tactic is used to evade detection by common security filters and antivirus solutions. Once the archive is extracted, the malware is deployed, potentially compromising the recipient’s system. i.e. Media Assets Complete Collection.rar > Contracts and Agreement Archive Collection.rar (password protected”). On extracting we could see four files, wherein Digital Agreement Terms and Payments Comprehensive Evaluation.exe is a malicious payload.
Attack Initialization:
Phishing Stage:
Malware Delivery:
System Infection:
Our investigation began by analysing a sample, where it was flagged as malicious by 15 antivirus vendors on VirusTotal. Further analysis revealed that the sample drops a file named webcam.pif (AutoIt3.exe). The hash of this file, d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd, matched prior research conducted by the Qualys team, linking it to a campaign associated with the Lumma Stealer.
The malware communicates with Command and Control (C2) servers to exfiltrate stolen data. Initially, it attempts to make a DNS request to "ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh," though these servers are currently unreachable. Subsequently, the malware connects to the IP address 89.105.223.80 on port 27105 and resolves the URL http://vm95039.vps.client-server.site:27105/.
DNS: ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh
TCP: 89.105.223.80:27105
Resolve: http://vm95039.vps.client-server.site:27105/
The Digital Agreement Terms and Payments comprehensive Evaluation.exe initiates the execution directly in temp directory and copies “Larger.bat” and “Webcamps.pif” into the directory. This could be an attempt to create a batch script for automated execution of additional commands, often used by malware for persistence or to trigger further malicious activity.
The obfuscated Larger.bat file checks for antivirus processes, including wrsa.exe (Webroot), opssvc.exe (Quick Heal), and bdservicehost.exe (Bitdefender), among others, by using the tasklist and findstr commands. Malware often performs these checks to identify and potentially disable antivirus programs.
After execution, a legitimate AutoIt scripting interpreter (disguised as "webcams.pif") is downloaded to run a heavily obfuscated script (referred to as “V” in the analyzed sample). This script is assembled by concatenating various "chunks" of data from several other files, which are created through a series of copy-and-merge operations executed from the command prompt.
The purpose of the AutoIt script is to deploy the legitimate RegAsm.exe binary, which serves as a container for injecting malicious .NET code. AutoIt is a development language frequently utilized by malware authors to create and obfuscate malicious software.
The malware drops two files webcams.pif and RegAsm.exe into the folder named "10183” of temp directory.
We conducted a deeper investigation into the threat actor's infrastructure and discovered a malicious compressed RAR file uploaded to OneDrive. Further analysis revealed the owner’s email, “[email protected],” and noted that the RAR file was last updated on 8/15/2024.
Stealer Log Analysis:
Interestingly, we also discovered a stealer log from the threat actor’s email account, exposing details of the entire campaign. This included SMTP email accounts (such as onet.eu and Murena.io), SOCKS5 proxies, Google Cloud APIs, victim emails and cookies, as well as phishing templates.
It appears that a multi-parser tool was used to collect data from YouTube, allowing the threat actor to obtain a large number of email addresses associated with YouTube channels as part of their initial reconnaissance efforts.
Here is a template from the stealer log used to impersonate brands for sending malicious spam emails to users.
Threat actors create templates for fake SMTP or temporary email accounts to send emails with malicious attachments. These templates are designed to impersonate legitimate brands, using familiar logos, formatting, and language to deceive recipients and increase the likelihood that they’ll open the harmful attachment.
Numerous SMTP accounts impersonating public relations and media entities have been created to target YouTube audiences.
From information.txt, we found that the threat actor is using automation tools for sending spear phishing emails and other automation tasks.
We were able to log into the Murena.io SMTP account and found evidence of a large-scale campaign, with the threat actor sending around 500-1,000 spam emails from a single email address, impersonating the Popular Brand. Below is a screenshot of one of the phishing emails sent to victims.
We also discovered a history of previous login sessions, which included details such as session IP, region, login time, and device type.
Detailed information for one of the IP addresses indicates that it belongs to an ISP and may be a compromised user machine frequently exploited by threat actors. 91.94.88.209
The phone number registered on the SMTP mail account is +48537977468, which has a Poland country code. However, it might be a temporary mobile number.
Our researchers noted a username "raez228” in Threat actor’s stealer log.
We found a match for the username "raez228" on a gaming platform called Twitch.tv, which is used for streaming live gaming sessions.
Twitch Profile: https://www.twitch.tv/raez228/about
This diamond model highlights a well-coordinated and resourceful threat actor leveraging advanced tools and techniques to compromise social media accounts and organizations globally.
The adversary leverages malware and sophisticated techniques for targeted attacks. Their actions suggest a well-organized group with access to diverse tools and resources.
The adversary uses a robust infrastructure to support its campaigns, including:
The adversary exhibits the following key capabilities:
Geography: The campaign has a global impact, with no specific regional focus.
Take action now
CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.
Digital Risk Protection platform which gives Initial Attack Vector Protection for employees and customers.
Software and Supply chain Monitoring providing Initial Attack Vector Protection for Software Supply Chain risks.
Creates a blueprint of an organization's external attack surface including the core infrastructure and the software components.
Instant Security Score for any Android Mobile App on your phone. Search for any app to get an instant risk score.
11
min read
Cybercriminals are increasingly targeting YouTube creators by exploiting fake brand collaboration offers to distribute malware. These sophisticated phishing campaigns involve carefully crafted emails that impersonate trusted brands, presenting enticing partnership deals. The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection. Once downloaded, the malware can steal sensitive information, including login credentials and financial data, while also granting attackers remote access to the victim’s systems. With content creators and marketers as primary targets, this global campaign underscores the importance of verifying collaboration requests and adopting robust cybersecurity measures to protect against such threats.
This report highlights a sophisticated malware campaign targeting businesses through email phishing. The attackers are leveraging trusted brand names and professional collaboration offers as a cover to distribute malicious attachments. The email subject lines and contents are carefully crafted to appear as legitimate business opportunities, including promotions, partnership proposals, and marketing collaborations.
Key characteristics of the campaign include:
Cloudsek's threat researcher team has uncovered a malware campaign in which threat actors impersonate popular brands and their professional collaboration offers as a disguise to distribute malicious attachments. In the email below, the threat actor presents a brand collaboration proposal from, including a compensation structure based on subscriber count.
At the end of the email, the threat actor includes instructions and a OneDrive link to access a zip file containing the agreement and promotional materials, secured with the password.
When the YouTube victim clicked the URL in the email, they were directed to a Drive page. Further inspection revealed the Drive owner’s email, “[email protected],” and a creation date of 08/15/2024 for the OneDrive account.
Malicious payload is embedded within two compressed files. This tactic is used to evade detection by common security filters and antivirus solutions. Once the archive is extracted, the malware is deployed, potentially compromising the recipient’s system. i.e. Media Assets Complete Collection.rar > Contracts and Agreement Archive Collection.rar (password protected”). On extracting we could see four files, wherein Digital Agreement Terms and Payments Comprehensive Evaluation.exe is a malicious payload.
Attack Initialization:
Phishing Stage:
Malware Delivery:
System Infection:
Our investigation began by analysing a sample, where it was flagged as malicious by 15 antivirus vendors on VirusTotal. Further analysis revealed that the sample drops a file named webcam.pif (AutoIt3.exe). The hash of this file, d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd, matched prior research conducted by the Qualys team, linking it to a campaign associated with the Lumma Stealer.
The malware communicates with Command and Control (C2) servers to exfiltrate stolen data. Initially, it attempts to make a DNS request to "ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh," though these servers are currently unreachable. Subsequently, the malware connects to the IP address 89.105.223.80 on port 27105 and resolves the URL http://vm95039.vps.client-server.site:27105/.
DNS: ukCmCsVdaZGZaOh.ukCmCsVdaZGZaOh
TCP: 89.105.223.80:27105
Resolve: http://vm95039.vps.client-server.site:27105/
The Digital Agreement Terms and Payments comprehensive Evaluation.exe initiates the execution directly in temp directory and copies “Larger.bat” and “Webcamps.pif” into the directory. This could be an attempt to create a batch script for automated execution of additional commands, often used by malware for persistence or to trigger further malicious activity.
The obfuscated Larger.bat file checks for antivirus processes, including wrsa.exe (Webroot), opssvc.exe (Quick Heal), and bdservicehost.exe (Bitdefender), among others, by using the tasklist and findstr commands. Malware often performs these checks to identify and potentially disable antivirus programs.
After execution, a legitimate AutoIt scripting interpreter (disguised as "webcams.pif") is downloaded to run a heavily obfuscated script (referred to as “V” in the analyzed sample). This script is assembled by concatenating various "chunks" of data from several other files, which are created through a series of copy-and-merge operations executed from the command prompt.
The purpose of the AutoIt script is to deploy the legitimate RegAsm.exe binary, which serves as a container for injecting malicious .NET code. AutoIt is a development language frequently utilized by malware authors to create and obfuscate malicious software.
The malware drops two files webcams.pif and RegAsm.exe into the folder named "10183” of temp directory.
We conducted a deeper investigation into the threat actor's infrastructure and discovered a malicious compressed RAR file uploaded to OneDrive. Further analysis revealed the owner’s email, “[email protected],” and noted that the RAR file was last updated on 8/15/2024.
Stealer Log Analysis:
Interestingly, we also discovered a stealer log from the threat actor’s email account, exposing details of the entire campaign. This included SMTP email accounts (such as onet.eu and Murena.io), SOCKS5 proxies, Google Cloud APIs, victim emails and cookies, as well as phishing templates.
It appears that a multi-parser tool was used to collect data from YouTube, allowing the threat actor to obtain a large number of email addresses associated with YouTube channels as part of their initial reconnaissance efforts.
Here is a template from the stealer log used to impersonate brands for sending malicious spam emails to users.
Threat actors create templates for fake SMTP or temporary email accounts to send emails with malicious attachments. These templates are designed to impersonate legitimate brands, using familiar logos, formatting, and language to deceive recipients and increase the likelihood that they’ll open the harmful attachment.
Numerous SMTP accounts impersonating public relations and media entities have been created to target YouTube audiences.
From information.txt, we found that the threat actor is using automation tools for sending spear phishing emails and other automation tasks.
We were able to log into the Murena.io SMTP account and found evidence of a large-scale campaign, with the threat actor sending around 500-1,000 spam emails from a single email address, impersonating the Popular Brand. Below is a screenshot of one of the phishing emails sent to victims.
We also discovered a history of previous login sessions, which included details such as session IP, region, login time, and device type.
Detailed information for one of the IP addresses indicates that it belongs to an ISP and may be a compromised user machine frequently exploited by threat actors. 91.94.88.209
The phone number registered on the SMTP mail account is +48537977468, which has a Poland country code. However, it might be a temporary mobile number.
Our researchers noted a username "raez228” in Threat actor’s stealer log.
We found a match for the username "raez228" on a gaming platform called Twitch.tv, which is used for streaming live gaming sessions.
Twitch Profile: https://www.twitch.tv/raez228/about
This diamond model highlights a well-coordinated and resourceful threat actor leveraging advanced tools and techniques to compromise social media accounts and organizations globally.
The adversary leverages malware and sophisticated techniques for targeted attacks. Their actions suggest a well-organized group with access to diverse tools and resources.
The adversary uses a robust infrastructure to support its campaigns, including:
The adversary exhibits the following key capabilities:
Geography: The campaign has a global impact, with no specific regional focus.