BlackEnergy
BlackEnergy Malware was first reported in 2007 as an HTTP-based toolkit that generated bots to execute distributed denial of service attacks. It was created by Russian hacker Dmyrtro Oleksiuk around 2007. Oleksiuk also utilized the alias Cr4sh. In 2010, BlackEnergy 2 emerged with capabilities beyond DDoS. In 2014, BlackEnergy 3 came equipped with a variety of plug-ins. A Russian-based group known as Sandworm is attributed with using BlackEnergy targeted attacks. The attack is distributed via a Word document or PowerPoint attachment in an email, luring victims into clicking the seemingly legitimate file.
BlackEnergy 1 (BE1)
BlackEnergy's code facilitates different attack types to infect target machines. It is also equipped with server-side scripts which the perpetrators can develop in the command and control server. Cybercriminals use the BlackEnergy bot builder toolkit to generate customized bot client executable files that are then distributed to targets via email spam and phishing e-mail campaigns. BE1 lacks the exploit functionalities and relies on external tools to load the bot. BlackEnergy can be detected using the YARA signatures provided by the United States Department of Homeland Security.Key features
- Can target more than one IP address per hostname
- Has a runtime encrypter to evade detection by antivirus software
- Hides its processes in a system driver
Command types
- DDoS attack commands
- Download commands to retrieve and launch new or updated executables from its server
- Control commands
BlackEnergy 2 (BE2)
Capabilities
- Can execute local files
- Can download and execute remote files
- Updates itself and its plugins with command and control servers
- Can execute die or destroy commands
BlackEnergy 3 (BE3)
This variant of the malware was involved in the December 2015 Ukraine power grid cyberattack.
Plug-ins
- fs.dll — File system operations
- si.dll — System information, “BlackEnergy Lite”
- jn.dll — Parasitic infector
- ki.dll — Keystroke Logging
- ps.dll — Password stealer
- ss.dll — Screenshots
- vs.dll — Network discovery, remote execution
- tv.dll — Team viewer
- rd.dll — Simple pseudo “remote desktop”
- up.dll — Update malware
- dc.dll — List Windows accounts
- bs.dll — Query system hardware, BIOS, and Windows info
- dstr.dll — Destroy system
- scan.dll — Network scan