Saint Bear

Saint Bear is a Russian-nexus threat actor active since early 2021, primarily targeting entities in Ukraine and Georgia. The group is notable for a specific remote access tool, Saint Bot, and information stealer, OutSteel in campaigns. Saint Bear typically relies on phishing or web staging of malicious documents and related file types for initial access, spoofing government or related entities.[1][2] Saint Bear has previously been confused with Ember Bear operations, but analysis of behaviors, tools, and targeting indicates these are distinct clusters.

ID: G1031
Associated Groups: Storm-0587, TA471, UAC-0056, Lorec53
Version: 1.0
Created: 25 May 2024
Last Modified: 12 August 2024

Associated Group Descriptions

Name Description
Storm-0587

[2]

TA471

[1]

UAC-0056

[1]

Lorec53

[1]

Techniques Used

Domain ID Name Use
Enterprise T1656 伪装

Saint Bear has impersonated government and related entities in both phishing activity and developing web sites with malicious links that mimic legitimate resources.[2]

Enterprise T1112 修改注册表

Saint Bear will leverage malicious Windows batch scripts to modify registry values associated with Windows Defender functionality.[1]

Enterprise T1059 命令与脚本解释器

Saint Bear has used the Windows Script Host (wscript) to execute intermediate files written to victim machines.[1]

.001 PowerShell

Saint Bear relies extensively on PowerShell execution from malicious attachments and related content to retrieve and execute follow-on payloads.[1]

.003 Windows Command Shell

Saint Bear initial loaders will also drop a malicious Windows batch file, available via open source GitHub repositories, that disables Microsoft Defender functionality.[1]

.007 JavaScript

Saint Bear has delivered malicious Microsoft Office files containing an embedded JavaScript object that would, on execution, download and execute OutSteel and Saint Bot.[1]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

Saint Bear will modify registry entries and scheduled task objects associated with Windows Defender to disable its functionality.[1]

Enterprise T1203 客户端执行漏洞利用

Saint Bear has leveraged vulnerabilities in client applications such as CVE-2017-11882 in Microsoft Office to enable code execution in victim environments.[1]

Enterprise T1589 .002 收集受害者身份信息: Email Addresses

Saint Bear gathered victim email information in advance of phishing operations for targeted attacks.[1]

Enterprise T1608 .001 暂存能力: Upload Malware

Saint Bear has used the Discord content delivery network for hosting malicious content referenced in links and emails.[1]

Enterprise T1027 .002 混淆文件或信息: Software Packing

Saint Bear clones .NET assemblies from other .NET binaries as well as cloning code signing certificates from other software to obfuscate the initial loader payload.[1]

.013 混淆文件或信息: Encrypted/Encoded File

Saint Bear initial payloads included encoded follow-on payloads located in the resources file of the first-stage loader.[1]

Enterprise T1204 .001 用户执行: Malicious Link

Saint Bear has, in addition to email-based phishing attachments, used malicious websites masquerading as legitimate entities to host links to malicious files for user execution.[1][2]

.002 用户执行: Malicious File

Saint Bear relies on user interaction and execution of malicious attachments and similar for initial execution on victim systems.[1]

Enterprise T1583 .006 获取基础设施: Web Services

Saint Bear has leveraged the Discord content delivery network to host malicious content for retrieval during initial access operations.[1]

Enterprise T1497 虚拟化/沙盒规避

Saint Bear contains several anti-analysis and anti-virtualization checks.[1]

Enterprise T1566 .001 钓鱼: Spearphishing Attachment

Saint Bear uses a variety of file formats, such as Microsoft Office documents, ZIP archives, PDF documents, and other items as phishing attachments for initial access.[1]

Enterprise T1553 .002 颠覆信任控制: Code Signing

Saint Bear has used an initial loader malware featuring a legitimate code signing certificate associated with "Electrum Technologies GmbH."[1]

Software

ID Name References Techniques
S1017 OutSteel OutSteel is uniquely associated with Saint Bear as a post-exploitation document collection and exfiltration tool.[1] 从本地系统获取数据, 伪装: Match Legitimate Name or Location, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器: AutoHotKey & AutoIT, 应用层协议: Web Protocols, 文件和目录发现, 横向工具传输, 用户执行: Malicious Link, 用户执行: Malicious File, 移除指标: File Deletion, 自动化收集, 自动化渗出, 输入工具传输, 进程发现, 通过C2信道渗出, 钓鱼: Spearphishing Link, 钓鱼: Spearphishing Attachment
S1018 Saint Bot Saint Bot is closely correlated with Saint Bear operations as a common post-exploitation toolset.[1] 从本地系统获取数据, 伪装, 伪装: Match Legitimate Name or Location, 劫持执行流, 反混淆/解码文件或信息, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器: Visual Basic, 命令与脚本解释器: PowerShell, 应用层协议: Web Protocols, 数据编码: Standard Encoding, 文件和目录发现, 本机API, 查询注册表, 混淆文件或信息, 混淆文件或信息: Software Packing, 滥用权限提升控制机制: Bypass User Account Control, 用户执行: Malicious File, 用户执行: Malicious Link, 移除指标: File Deletion, 系统二进制代理执行: Regsvr32, 系统二进制代理执行: InstallUtil, 系统位置发现, 系统信息发现, 系统所有者/用户发现, 系统网络配置发现, 虚拟化/沙盒规避: Time Based Evasion, 虚拟化/沙盒规避: System Checks, 调试器规避, 输入工具传输, 进程发现, 进程注入: Dynamic-link Library Injection, 进程注入: Asynchronous Procedure Call, 进程注入: Process Hollowing, 钓鱼: Spearphishing Link, 钓鱼: Spearphishing Attachment, 预定任务/作业: Scheduled Task

References