{"id":128,"date":"2022-01-20T17:10:16","date_gmt":"2022-01-20T17:10:16","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=128"},"modified":"2022-01-20T17:10:16","modified_gmt":"2022-01-20T17:10:16","slug":"lokibot-in-latin-america","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2022\/01\/20\/lokibot-in-latin-america\/","title":{"rendered":"Lokibot in Latin America"},"content":{"rendered":"<h1>Overview<\/h1>\n<p>The following post describes the identified TTPs and IOCs of a campaign analyzed by SCILabs, that is distributing <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa20-266a\">Lokibot<\/a> in LATAM. It was identified by SCILabs while conducting a threat hunting during the third week of September. The pretext of the campaign is related to urgent financial issues such as: invoices, payment vouchers, payment notices, price quotes, payment details, and more. In this post, the respective IOCs will be provided to protect organizations.<\/p>\n<p>The investigation did not obtain further details on how this campaign is delivered; however, SCILabs considers the use of email phishing as the top threat <a href=\"https:\/\/infochannel.info\/aumentan-ataques-de-phishing-60-en-mexico-sophos\/\">vector<\/a> with a medium confidence level. After analyzing the campaign and the artifact, SCILabs determined with high confidence that the attacker&#8217;s general objective is to steal confidential information from the victims<strong>, <\/strong>as the trojan features are profiled to steal cryptocurrency wallets, usernames, passwords, and other credentials. It is important to mention that the cybercriminal infrastructure seems to be intermittently active on demand or when they launch a campaign.<\/p>\n<p>Finally, it is important to mention that the campaign has begun to accelerate its pace. Since, during the first half of the year, only <a href=\"https:\/\/twitter.com\/1ZRR4H\/status\/1359896842482446338\">2<\/a> <a href=\"https:\/\/twitter.com\/1ZRR4H\/status\/1357063458576080903\">attacks<\/a>\u00a0were observed with the same characteristics, one in Mexico and the other in Peru. However, during the last 2 months a notable increase in attacks with the same characteristics has been observed in the region. Although it is not known who the campaign is targeting, SCILabs determined with medium confidence that the campaign is aimed at ordinary users but has the potential to start targeting various institutions to obtain confidential information from them. Additionally, with the intelligence of SCILabs and information obtained from public and private sources, it is possible to determine that the campaign impersonates financial sector institutions to give credibility to the phishing pretext.<\/p>\n<p>SCILabs will continue to analyze similar attacks as no key elements have been observed, such as the initial access method, lateral movements, or any other essential feature, which allows profiling cybercriminals and raising the level of confidence about the similarities between other campaigns and the attack analyzed throughout this post.<\/p>\n<h1>How could it affect an organization?<\/h1>\n<p>The campaign can affect the confidentiality of the company\u2019s information because Lokibot\u2019s main purpose is to steal sensitive information, so there is no guarantee that information assets will be protected from unauthorized viewing, data leakage, or intrusion into organization systems.<\/p>\n<h1>Analysis<\/h1>\n<h2>Threat Context<\/h2>\n<p><strong>\u00a0<\/strong>The artifact was detected through a threat hunt. Its specifications can be found below:<\/p>\n<ul>\n<li><strong>TGU0000207262.pdf.exe: <\/strong>is a trojan that steals sensitive information such as usernames, passwords, cryptocurrency wallets, and other credentials.<\/li>\n<\/ul>\n<h2>Attack Flow<\/h2>\n<figure id=\"attachment_124\" aria-describedby=\"caption-attachment-124\" style=\"width: 957px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-124\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/01\/16.png\" alt=\"\" width=\"957\" height=\"320\" \/><figcaption id=\"caption-attachment-124\" class=\"wp-caption-text\">Figure 1 &#8211; Attack flow<\/figcaption><\/figure>\n<h2>Analysis of Lokibot<\/h2>\n<figure id=\"attachment_125\" aria-describedby=\"caption-attachment-125\" style=\"width: 953px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-125\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/01\/17.png\" alt=\"\" width=\"953\" height=\"316\" \/><figcaption id=\"caption-attachment-125\" class=\"wp-caption-text\">Figure 2 &#8211; Analysis of Lokibot<\/figcaption><\/figure>\n<h1>Technical summary<\/h1>\n<ul>\n<li>The initial access method is uncertain, but with intelligence generated by other campaigns, SCILabs has hypothesized that cybercriminals may be using standard techniques such as email phishing, smishing, or malvertising as a decoy to infect the victim.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>When the user executes the file, the malware drops a binary, identified as <strong>Lokibot.<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>The <strong>Lokibot<\/strong> trojan detects if it is running on a sandbox using:<\/li>\n<li><em>WINE_GET_UNIX_FILE_NAME<\/em><\/li>\n<li><em>DLL<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Creates a DirectInput object to start capturing keystrokes<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>It harvests and steals Putty\/WinSCP information opening:<\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\9bis.com\\KiTTY\\Sessions<\/em><\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\Martin Prikryl<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>It collects and robs browser information reading:<\/li>\n<li><em>C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\UserData\\Default\\LoginData<\/em><\/li>\n<li><em>C:\\Users\\user\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>It gathers and steals ftp login credentials through:<\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts<\/em><\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\NCHSoftware\\ClassicFTP\\FTPAccounts<\/em><\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\FlashPeak\\BlazeFtp\\Settings<\/em><\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts<\/em><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Steals mail credentials via file access from:<\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\IncrediMail\\Identities<\/em><\/li>\n<li><em>HKEY_CURRENT_USER\\Software\\Microsoft\\WindowsNT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook<\/em><\/li>\n<\/ul>\n<p><em>\u00a0<\/em><\/p>\n<ul>\n<li>Finally, it sends the collected sensitive information to its C2 server located at <strong>hxxp[:]\/\/ccjjlogsx[.]com\/uu\/me\/ii[.]php<\/strong><\/li>\n<\/ul>\n<h1><a name=\"_Toc82159017\"><\/a>TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/h1>\n<p>Below are the MITRE matrixes based on the element analyzed.<\/p>\n<table width=\"99%\">\n<thead>\n<tr>\n<td width=\"20%\"><strong>Defense Evasion<\/strong><\/td>\n<td width=\"20%\"><strong>Credential Access<\/strong><\/td>\n<td width=\"20%\"><strong>Discovery<\/strong><\/td>\n<td width=\"20%\"><strong>Collection<\/strong><\/td>\n<td width=\"20%\"><strong>C&amp;C<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"20%\">T1140<\/p>\n<p>Deobfuscate\/Decode Files or Information<\/td>\n<td width=\"20%\">T1003<\/p>\n<p>OS Credential Dumping<\/td>\n<td width=\"20%\">T1552.002<\/p>\n<p>Credentials in Registry<\/td>\n<td width=\"20%\">T1560<\/p>\n<p>Archive Collected Data<\/td>\n<td width=\"20%\">T1573<\/p>\n<p>Encrypted Channel<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">T1027<\/p>\n<p>Obfuscated Files or Information<\/td>\n<td width=\"20%\">T1056<\/p>\n<p>Input Capture<\/td>\n<td width=\"20%\">T1083<\/p>\n<p>File and Directory Discovery<\/td>\n<td width=\"20%\">T1005<\/p>\n<p>Data from Local System<\/td>\n<td width=\"20%\">T1095<\/p>\n<p>Non-Application Layer Protocol<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">T1027.002<\/p>\n<p>Software Packing<\/td>\n<td width=\"20%\">T1552.002<\/p>\n<p>Credentials in Registry<\/td>\n<td width=\"20%\">T1082<\/p>\n<p>System Information Discovery<\/td>\n<td width=\"20%\">T1114<\/p>\n<p>Email Collection<\/td>\n<td width=\"20%\">T1071<\/p>\n<p>Application Layer Protocol<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">T1497<\/p>\n<p>Virtualization\/Sandbox Evasion<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">T1518.001<\/p>\n<p>Security Software Discovery<\/td>\n<td width=\"20%\">T1056<\/p>\n<p>Input Capture<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">T1055<\/p>\n<p>Process Injection<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">T1057<\/p>\n<p>Process Discovery<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">T1497<\/p>\n<p>Virtualization\/Sandbox Evasion<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">T1033<\/p>\n<p>System Owner\/User Discovery<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<td width=\"20%\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Table 1 &#8211; MITRE\u2019s ATT&amp;CK framework of Lokibot<\/p>\n<p>&nbsp;<\/p>\n<h1><a name=\"_Toc80195004\"><\/a>Assessment<\/h1>\n<p>The danger of this campaign lies in its sudden accelerated pace observed in recent months, compared to the first half of the year, which could mean that the attacks observed during the first months of the year were only tests to evolve and refine their pretexts of phishing.<\/p>\n<p>Based on the research carried out, it is possible to determine that the cybercriminals plan to continue evolving and refining the campaign by taking advantage of the misinformation of people against phishing scenarios, as well as the sense of urgency that attackers generate in the victims when receiving an email related to financial issues.<\/p>\n<p>SCILabs will continue to monitor the campaign, its behavior, and malware, as well as any group of cybercriminals that begins to take credit for the attacks.<\/p>\n<p>&nbsp;<\/p>\n<h1><a name=\"_Toc59312917\"><\/a><a name=\"_Toc80195005\"><\/a>IoC\u2019s<\/h1>\n<p>A77D42E5CF03FCE86D5FCC844840AB9F8DB3F562791348AE5BCA2AABA0D3F54D<\/p>\n<p>55DD34E26E94366E5CB30AA3FD40CD9AD85F7D4D36DE6885084257290087FFA4<\/p>\n<p>EB121B73BB46F824AFC5E73C7CCDC93340D87DEA79E61DF986D90BD3B8A947B1<\/p>\n<p>08DCC10E83BCEDEDF65A87E8F0A3E631F5BBAFDD13AB2B2213EFE9C664CB96A5<\/p>\n<p>D3B21861D2DBBAE76B30B6C1253BE0775C7EA63D183DED44F041A609CBD929C4<\/p>\n<p>90770A21604880EF1E140798AD7F679383853F070358A5B29C15C4A26A9AA9EB<\/p>\n<p>F4982822F4DD3DB87F26C5C9BB9AB4C7BAAC9BF970CABABA3493E1A5DD8CE5F7<\/p>\n<p>0F747FAA13A45806A17DE55E3353849F7FF6C9687AC78CBA22DFD6049192C42A<\/p>\n<p>C60D377A5324054912D63303E2553B4B39E6778447A3A23EEFD24EB09FFA4A8F<\/p>\n<p>HXXP[:]\/\/ALPHASTAND[.]TRADE\/ALIEN\/FRE[.]PHP<\/p>\n<p>HXXP[:]\/\/ALPHASTAND[.]TOP\/ALIEN\/FRE[.]PHP<\/p>\n<p>HXXP[:]\/\/KBFVZOBOSS[.]BID\/ALIEN\/FRE[.]PHP<\/p>\n<p>HXXP[:]\/\/ALPHASTAND[.]WIN\/ALIEN\/FRE[.]PHP<\/p>\n<p>HXXP[:]\/\/CCJJLOGSX[.]COM\/UU\/ME\/II[.]PHP<\/p>\n<p>HXXP[:]\/\/CJJLOGSX[.]COM\/UU\/ME\/TC[.]PHP<\/p>\n<p>HXXP:\/\/63[.]141[.]228[.]141\/32[.]PHP<\/p>\n<p>HXXP:\/\/51[.]195[.]53[.]221\/P[.]PHP<\/p>\n<p>172[.]67[.]143[.]169<\/p>\n<p>104[.]21[.]39[.]75<\/p>\n<p>63[.]141[.]228[.]141<\/p>\n<p>51[.]195[.]53[.]221<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The following post describes the identified TTPs and IOCs of a campaign analyzed by SCILabs, that is distributing Lokibot<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-128","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=128"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/128\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}