RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

In RomCom’s latest campaign, Arctic Wolf observed the threat actor targeting politicians in Ukraine who are working closely with Western countries, and a U.S.-based healthcare company providing humanitarian aid to refugees from Ukraine.
6 min read

Summary

The RomCom threat actor has been carefully following geopolitical events surrounding the war in Ukraine, targeting militaries, food supply chains, and IT companies. In RomCom’s latest campaign, the Arctic Wolf® Labs team observed RomCom targeting politicians in Ukraine who are working closely with Western countries, and a U.S.-based healthcare company providing humanitarian aid to the refugees fleeing from Ukraine and receiving medical assistance in the U.S.

This report is the first part of our research covering the details of RomCom’s latest malicious campaign, while the second part will cover RomCom’s behaviors, including detection engineering.

Brief MITRE ATT&CK® Information

Tactic Technique
TA0043 T1598, T1598.002
TA0001 T1189
TA0002 T1559, T1218, T1204,
TA0003 T1546.015
TA0005 T1027, T1140, T1036, T1564.001, T1112
T15007 T1057, T1083, T1082, T1217
TA0009 T1113
TA0010 T1041
TA0011 T1090, T1071, T1071.001, T1095, T1573.002, T1105
TA0040 T1486


Weaponization and Technical Overview

Weapons Trojanized applications, x64 dll payloads
Attack Vector Spear-phishing
Network Infrastructure Cloned websites, C2 servers using self-signed SSL certificates
Targets Politicians from Ukraine, U.S.-based Healthcare organizations


Technical Analysis

Context

In mid-March 2023, we noticed an uptick in telemetry related to our tracking of the operator behind the RomCom remote access trojan (RAT). This uptick encompassed the creation of several new domains and associated artifacts, one of which, startleague[.]net, was linked to a file correlating to the SHA-256 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3, titled RemoteDesktopManager.2022.3.35.0.exe.

What is Remote Desktop Manager?

As its name suggests, Devolutions Remote Desktop Manager (RDM) is a legitimate utility designed to help facilitate secure remote connectivity. It is compatible with many commonly used remote connection utilities and technologies such as Citrix, FTP, Apple Remote Desktop, TeamViewer, LogMeIn, Microsoft Remote Desktop (RDP), SSH Shell, and many more.

According to the developer’s website:

Remote Desktop Manager is an application that integrates a comprehensive set of tools and managers to meet the needs of any IT team. It is designed to centralize remote connection technologies, credentials, and secure access to these resources. Most connections are established using either an external library or third-party software.”

Attack Vector

Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software. There is a high likelihood that this is the same in this case, as the tactics, techniques, and procedures (TTPs) align. We have confirmed that a cloned website was used to host a malicious specially crafted Installer for the Trojanized version of Devolutions Remote Desktop Manager, and that this malicious website was almost indistinguishable from the legitimate one.

The fake domain utilized a form of typosquatting to attempt to appear as close to the real one as possible. This kind of domain (ab)use is common in phishing attacks of all kinds, when threat actors set up online infrastructure with one thing in common: trying to fool the user into believing they are interacting with the real company or organization, by making their fake website look as much like the real one as possible.

It is important to understand that just because a website has a company name you know and trust in the URL, that doesn’t mean the site you are visiting is owned or operated by that company.

Real Domain Fake Domain
devolutions[.]net rdp-devolutions[.]com

 

Figure 1: Example of the real (L) and fake (R) Remote Desktop Manager websites side by side.

As shown in Figure 2 below, the malicious file Installer.RemoteDesktopManager.2022.3.35.0.exe is hosted on the observed cloned/fake website.

Figure 2: rdp-devolutions[.]com malware URL.

Weaponization

Once downloaded by the user, the Trojanized installer from the cloned website makes every attempt to appear legitimate. Statically, it is a 64-bit executable (.exe) which is signed by an in-date digital signature.

However, further analysis into the legitimate download of Devolutions RDM suggests the signing information does not correlate and is, in fact, issued by a completely different organization. The fraudulent certificate obtained from the malicious installer is shown below in Figure 3.

Figure 3: Digital signature of the trojanized Installer.

Upon execution of the trojanized main setup file, Installer.RemoteDesktopManager.2022.3.35.0.exe, the user is prompted to select the destination path of where they’d like the file(s) to be installed.

Figure 4: Setup Installer for the trojanized DRDM.

Unbeknownst to the victim, during this prompt, the malware has already begun its execution chain. The malware drops various components into a hidden path via C:\\Users\\Public\\Libraries. (Further details can be found below in our Indicators of Compromise list.)

Dropped binaries:

  • update.conf
  • Installer.RemoteDesktopManager.2022.3.35.0.exe
  • netid4050320587.dll
  • prxyms4050320587.dll
  • desktop.ini (already present)
  • Recorded TV (already present)

Figure 5: Components dropped by RomCom are deployed, regardless of ‘Setup’.

The core malicious binary related to RomCom is the file %netid4050320587.dll0%. This Dynamic-Link Library (.DLL) is executed via the Windows host process RunDLL32 in the background while the unsuspecting victim tries installing the fake software.

This malicious binary is executed, as seen in Figure 6 below, via:

C:\\Windows\\System32\\rundll32.exe C:\\Users\\Public\\Libraries\\netid4050320587.dll0,Main netid4050320587.dll0

Figure 6: Execution of the core RomCom DLL.

The malicious dropper contains a legacy installer for the legitimate program to masquerade its purposes further. This installer is dropped both in C:\\Users\\User\\AppData\\Local\\Temp\\%js-TIDj8.tmp%\\ and C:\\Users\\Public\\Library\\. The SHA-256 is b1b015f3762b4b9bfce928401a3b13beee5fb70c989b97a03d57545fc00a1978

In addition to deploying and executing its payload of malware, this Installer will continue seemingly as intended, so the user is left none the wiser.

On execution (as of April 2023), the Installer for the fake Devolutions Remote Manager will fail its setup as it cannot send data to the real Devolutions server. When the Installer receives this error, the installation terminates.

Meanwhile, the malware has been stealthily deployed on the victim host by the decoy Installer and has begun to carry out its malicious activities.

Figure 7: Continuation of trojanized Installer.

The function of the malicious files dropped is as follows:

  • %netid3231462335.dll% – This is the core RomCom RAT payload. It is a new version of the implant we initially uncovered last Fall. Improvements were made to its obfuscation to thwart static analysis.
  • The application’s core functionality remains relatively the same, enabling the threat actor full access to the victim’s device.
  • %prxyms1500330613.dll% – This is the RomCom Loader file. This file is used to execute RomCom via the command line.
  • procsys.dll – This is a browser stealer, and steals browser data such as passwords, browsing history, and site cookies.
  • update.conf – A small supporting configuration file for RomCom.

The full execution chain is shown below in Figure 8.

Figure 8: Execution of trojanized RomCom Installer (Click to enlarge).

Networking

Upon successful installation, RomCom will enumerate the infected host and gather some basic host and user metadata, which is then sent to its command-and-control (C2) server – startleague[.]net – to “check in”.

Figure 9: Request sent via the WinHTTP API.

Additionally, this can be noted via the TCP Stream shown in Figure 10 below.

Figure 10: Wireshark capture of initial RomCom communication.

If, for any reason, a connection attempt to its C2 is unsuccessful, the malware appears to have some redundancy. If its initial requests cannot be handled, it will attempt to connect via ICMP Requests instead.

Figure 11: Request sent via ICMP to RomCom’s C2.

Additionally, this can be seen in Figure 12 (below) in a network capture.

Figure 12: ICMP request to C2 related to RomCom.

Network Infrastructure

As mentioned previously, the purpose of the domain rdp-devolutions[.]com is to host RomCom’s cloned website, both hosting and delivering a Trojanized/fake version of the Devolutions’ Remote Desktop Manager software.

The domain was registered on 2023-03-09 and initially tied to the IP address 91.235.116[.]232 for the time period 2023-03-11 to 2023-03-30, when it was updated to resolve to the IP address 74.119.239[.]234.

Domain name IP ASN Purpose
rdp-devolutions[.]com 74[.]119[.]239[.]234 AS51177

TIPZOR MEDIA SRL, RO

Malware hosting
startleague[.]net

 

46[.]246[.]98[.]15

 

AS42708

 

CLOUD HOSTING, SE

C2 server

 

 

The domain startleague[.]net was registered on 2022-12-19 and tied to the IP address 2.57.90[.]16. This continued until 2023-01-30, when it began resolving to the IP address 46.246.98[.]15.

Figure 13: VirusTotal graph showing the network infrastructure (Click to enlarge).

Targets

During the course of our investigations, Arctic Wolf® identified several victims primarily based in Ukraine. This aligns with previously seen geolocations targeted by RomCom. We have also observed evidence of at least one target based in the United States.

The victims targeted are involved in several dissimilar industries such as Military and Healthcare, united by the common thread of Russia’s invasion of Ukraine.

Figure 14: Geolocation of victims targeted in this RomCom campaign.

Additional Findings

GoTo Meeting

Over the course of our investigations, a similar binary was observed containing a confirmed RomCom implant. This time it was deployed within a trojanized installation of “GoTo Meeting”, a popular video conference software commonly used by a variety of enterprises, both large and small.

Following similar TTPs of previously observed samples of RomCom, the initial attack vector is a faked/cloned website that appears identical to the legitimate one. Below is an example of the cloned website for “GoTo Meeting”.

Figure 15: Faked/cloned website of the legitimate video conferencing app “GoTo Meeting”.

Like other samples of RomCom, it too hosts a trojanized installer containing a legitimate binary related to the intended product/service, whilst also containing a RomCom implant that will execute during installation by the user.

Details of this observed find are below:

SHA-256 a552b0b1c948e0ef4e51088f059c280a967ff40bf93ff9d62ebeb74e80f36fc5
File Name GoTo Meeting Opener.msi
File Size 21.02 MB (22040576 bytes)
Created 2022-06-30 12:11:22 UTC
Description Trojanized installer containing RomCom RAT


WinSCP

Furthermore, at the beginning of May 2023, a Twitter user with the handle @TLP_R3D identified a “potential RomCom C2” infrastructure noted via this tweet. Upon analyzing the noted IOCs, the Arctic Wolf Labs team confirmed that the samples in the attack chain indeed contained a RomCom payload.

Unlike previous samples of RomCom observed through our own investigations, this sample of RomCom masqueraded as the popular SSH file-transfer tool WinSCP, but it does not contain the RomCom payload itself.

Upon execution of WinSCP-5.21.8-Setup.exe, the malware will attempt to reach out to the noted IOCs (below) to download and execute itself.

  • hxxp://104.234.10.207:7931/itrdd/kcrs/file1[.]txt
  • hxxp://104.234.10.207:7931/itrdd/kcrs/file2[.]txt

It was confirmed by Arctic Wolf that these two files contain both the RomCom loader and the RomCom RAT payload itself.

SHA-256 c118895776e75eaa291d2a5f54f1de4f48756aec28cebaa1bf6fd9beb5d36301
File Name WinSCP-5.21.8-Setup.exe
File Size 1.22 MB (1280048 bytes)
Created 2023-05-03 10:15:01 UTC
Description RomCom downloader


Timeline of RomCom Attacks

Below is a timeline of all known RomCom attacks to date, including the name of the software Trojanized to deliver the malware payload in each attack.

Figure 16: Timeline of known RomCom attacks. 

Conclusions

Since at least mid-2022, RomCom has been a persistent threat affecting largely Ukrainian-based organizations, including both Government and Military. As the conflict between Ukraine and Russian forces escalates in Eastern Europe, the world becomes increasingly polarized by their support of one side or the other, whether on the ground in Ukraine via the provision of military supplies, or on a country’s own home turf via healthcare provided to those fleeing the conflict.

Following its observed Ukrainian-based targets, the RomCom group has been sighted by Arctic Wolf targeting other possibly pro-Ukrainian affiliated organizations – namely those based in the U.S. – in recent months. The last-observed campaigns target politicians in Ukraine, and a U.S.-based healthcare institution running a humanitarian aid program for refugees fleeing from Ukraine.

The threat actor behind the RomCom RAT appears to be actively interested in what Western countries are doing to support Ukraine, what Ukraine is doing, and who the refugees are receiving help from in the United States. If medical records stored electronically are stolen, it would be easy for the threat actor (and those they are affiliated with) to profile the patient and use that data in future war scenarios and in geopolitics in general.

Even the extraction of partial information, such as name, sex, date of birth, and related data, poses a potential risk to that person and those who provide them with any type of aid in future.

Indicators of Compromise (IOCs)

Main Binary

SHA-256 6d3ab9e729bb03ae8ae3fcd824474c5052a165de6cb4c27334969a542c7b261d
File Name Installer.RemoteDesktopManager.2022.3.35.0.exe
File Size 6.91 MB (7244272 bytes)
Created 2023-03-10 11:30:07 UTC
Details Main Windows 64-bit (Signed Binary) contains installer and bundled RomCom malware


Main Binary – Digital Certificate

Name Noray Consulting Ltd.
Serial Number 56 E1 49 7E FD DA B4 55 B2 35 E6 0C 3C 53 E7 F4
Name SSL.com Timestamping Unit 2022
Serial Number 1A D6 08 A7 D6 34 B5 CD DE 97 CB A3 CC F0 D0 4B


Main Binary – Drop Files (%Users%\\Public\\Libraries)

SHA-256 c94e889a6c9f4c37f34f75bf54e6d1b2cd7ee654cd397df348d46abe0b0f6ca3
File Name installer.RemoteDesktopManager.2022.3.35.0.exe
File Size 1.59 MB (1671808 bytes)
Created 2023-02-15 14:54:16 UTC
Description Legitimate Devolutions RDM installer

 

SHA-256 0501d09a219131657c54dba71faf2b9d793e466f2c7fdf6b0b3c50ec5b866b2a
File Name netid3231462335.dll0

netid3283347891.dll

netid [0-9] .dll

File Size 2.57 MB (2696704 bytes)
Created 2023-03-10 10:56:58 UTC
Description Core RomCom binary

 

SHA-256 65778e3afc448f89680e8de9791500d21a22e2279759d8d93e2ece2bc8dae04d
File Name prxyms3231462335.dll
File Size 2.54 MB (2660864 bytes)
Created 2023-03-10 10:57:01 UTC
Description RomCom Loader

 

SHA-256 8d805014ceb45195be5bab07a323970a1aa8bc60cdc529712bccaf6f3103e6a6
File Name procsys.dll
File Size 3.67 MB (3848704 bytes)
Created 2023-03-23 04:16:43 UTC
Description Additional infostealer


GoTo Meeting Opener Drop Files (%Users%\\Public\\Libraries)

SHA-256 3b26e27031a00a32f3616de5179a003951a9c92381cd8ec552d39f7285ff42ee
File Name MSI420A.tmp
File Size 20.88 MB (21899264 bytes)
Created 2023-02-15 06:04:43 UTC
Description RomCom RAT Dropper created by GoTo Meeting opener

 

SHA-256 3e293680e0f78e404fccb1ed6daa0b49d3f6ea71c81dbaa53092b7dd32e81a0d
File Name netid [0-9] .dll
File Size 5.02 MB (5266432 bytes)
Created 2023-02-14 13:59:54 UTC
Description Core RomCom binary

 

SHA-256 916153d8265a2f9344648e302c6b7b8d7e1f40f704b0df83edde43986ab68e56
File Name prxyms[0-9] .dll
File Size 4.97 MB (5215744 bytes)
Created 2023-02-14 13:58:54 UTC
Description Loader RomCom binary

 

SHA-256 e7914f823ed0763c7a03c3cfdbcf9344e1da93597733ac22fe3d31a5a4e179aa
File Name winipfile[0-9] .dll
File Size 5.41 MB (5676544 bytes)
Created 2023-02-14 14:00:20 UTC
Description RomCom binary


WinSCP-5.21 Drop Files (%Users%\\Public\\Libraries)

SHA-256 a5dae9b7ff88276f699eece44eb4b183f1b1de6bef9e159c417ba621a949f744
File Name bnert.dll0
File Size 390.00 KB (399360 bytes)
Created 2023-05-03 10:01:38 UTC
Description RomCom binary

 

SHA-256 1308146f161ed60c86532dd2d2de8de8b0401e27023fc56f83903f137fccacfd
File Name xlmtdm.dll
File Size 185.50 KB (189952 bytes)
Created 2023-05-03 10:04:11 UTC
Description RomCom loader


Networking

Domain rdp-devolutions[.]com
IP 74.119.239[.]234
Domain
startleague[.]net
IP 46.246.98[.]15
IP 104.234.10[.]207:7931

 

About Arctic Wolf Labs

Arctic Wolf Labs is a group of elite security researchers, data scientists, and security development engineers who explore security topics to deliver cutting-edge threat research on new and emerging adversaries, develop and refine advanced threat detection models with artificial intelligence and machine learning, and drive continuous improvement in the speed, scale, and detection efficacy of Arctic Wolf’s solution offerings.

Arctic Wolf Labs brings world-class security innovations to not only Arctic Wolf’s customer base, but the security community at large.

This article was originally posted on the BlackBerry® blog on June 7, 2023. Arctic Wolf acquired Cylance® and its research teams from BlackBerry in February 2025. The BlackBerry Research and Intelligence team is now part of Arctic Wolf Labs.

Share this post: