{"id":1490,"date":"2025-12-18T02:46:12","date_gmt":"2025-12-18T02:46:12","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=1490"},"modified":"2025-12-18T02:46:13","modified_gmt":"2025-12-18T02:46:13","slug":"bpl-side-loading-technique-exploited-by-threat-actors-in-latam","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2025\/12\/18\/bpl-side-loading-technique-exploited-by-threat-actors-in-latam\/","title":{"rendered":"BPL Side-Loading: technique exploited by threat actors in LATAM"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>The purpose of this post is to provide information on a technique disclosed in May of 2024 and recorded on multiple <a href=\"https:\/\/www.kroll.com\/en\/publications\/cyber\/idatloader-distribution\">open feeds<\/a> due to its continued use by some known and unknown threat groups (such as <em><a href=\"https:\/\/blog.scilabs.mx\/threat-profile-red-akodon-un-nuevo-actor-de-amenazas-distribuyendo-rats-dirigidos-a-colombia\/\" data-type=\"link\" data-id=\"https:\/\/blog.scilabs.mx\/threat-profile-red-akodon-un-nuevo-actor-de-amenazas-distribuyendo-rats-dirigidos-a-colombia\/\">Red Akodon<\/a><\/em>, which was profiled by SCILabs in April of 2024).<\/p>\n\n\n\n<p>Since mid-2024, SCILabs has consistently identified artifacts used in malware campaigns targeting LATAM that are executed during the infection process through the <a href=\"https:\/\/www.helpnetsecurity.com\/2024\/06\/26\/malware-bpl-sideloading\/\">BPL Side-Loading<\/a> technique in conjunction with <em><a href=\"https:\/\/any.run\/malware-trends\/hijackloader\">IDATLoader<\/a><\/em> malware. Most of these artifacts are distributed via phishing emails.<\/p>\n\n\n\n<p>The information provided here focuses on disclosing some of the malware campaigns primarily affecting Colombia, and potentially other LATAM countries, leveraging email pretexts such as alleged legal demands and citations, as well as a campaign impersonating a Crowdstrike update after the July 19, 2024 <a href=\"https:\/\/www.crowdstrike.com\/falcon-content-update-remediation-and-guidance-hub\/\">incident<\/a>, when the provider released a configuration content update for its Windows sensor (part of the Falcon Sensor platform) that resulted in critical operating system failures (Blue Screen of Death [<a href=\"https:\/\/www.dell.com\/support\/contents\/es-mx\/article\/product-support\/self-support-knowledgebase\/fix-common-issues\/blue-screen\">BSOD<\/a>]) in some Windows hosts.<\/p>\n\n\n\n<p>It is important to notice that this information aims to explain how BPL Side-Loading is exploited in conjunction with <em>IDATLoader<\/em> malware, with the objective of understanding recent malware campaigns under the premise that these techniques will likely continue to be employed constantly by threat actors in the future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can this affect your organization?<\/h2>\n\n\n\n<p>BPL Side-Loading has been previously recorded publicly; however, it hasn\u2019t received enough coverage nor sufficient in-depth analysis. This technique would allow an attacker to deploy any kind of malware, evading security controls such as EDR and AV. Consequently, organizations lacking prior knowledge of this technique and its functionality are unable to implement effective security countermeasures, which may lead to integrity, confidentiality and availability risks, leading to financial losses and reputational damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Technical analysis<\/h2>\n\n\n\n<p><strong>First campaign<\/strong><\/p>\n\n\n\n<p>This campaign was found through open feed <a href=\"https:\/\/lab52.io\/blog\/dll-side-loading-through-iobit-against-colombia\/\">posts<\/a> where the distribution method was determined to be phishing emails using a pretext of a supposed legal citation impersonating the \u201c<em>Fiscal\u00eda General de la Naci\u00f3n<\/em>\u201d of Colombia.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image.png\" alt=\"\" class=\"wp-image-1439\"\/><figcaption class=\"wp-element-caption\">Image 1. Image found in <a href=\"https:\/\/lab52.io\/blog\/dll-side-loading-through-iobit-against-colombia\/\" data-type=\"link\" data-id=\"https:\/\/lab52.io\/blog\/dll-side-loading-through-iobit-against-colombia\/\">open sources<\/a> depicting the phishing email template<\/figcaption><\/figure><\/div>\n\n\n<p>This email has a ZIP file attached by the name of \u201c<em>08 CITACION DEMANDA.zip<\/em>\u201d, which works as the first dropper.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-1.png\" alt=\"\" class=\"wp-image-1440\"\/><figcaption class=\"wp-element-caption\">Image 2. Files attached to the compressed file<\/figcaption><\/figure><\/div>\n\n\n<p>We\u2019ll provide a brief description of the artifacts identified inside the ZIP file, as their full analysis is not the main objective of this post. The focus is to understand their role in exploiting the BPL Side-Loading technique. Moreover, we will examine the functionality of the highlighted artifacts further down the post.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>08 CITACION DEMANDA.exe<\/strong>: Legitimate <a href=\"https:\/\/www.iobit.com\/en\/index.php\">IObit<\/a> <a href=\"https:\/\/www.iobit.com\/es\/recommend\/dbfree.php\">Driver Booster<\/a> executable developed in Delphi<\/li>\n\n\n\n<li><strong>dreamland.m4a<\/strong>: Encoded Shellcode (<em>IDATLoader<\/em>)<\/li>\n\n\n\n<li><strong>cutcherry.vcf<\/strong>: <em><a href=\"https:\/\/www.incibe.es\/servicio-antibotnet\/info\/AsyncRAT\">AsyncRAT<\/a><\/em> encrypted payload, encrypted by <em>IDATLoader<\/em><\/li>\n\n\n\n<li><strong>vcl120.bpl<\/strong>: Malicious BPL. Loads the first payload into Driver Booster executable<\/li>\n\n\n\n<li><strong>Register.dll<\/strong>: Legitimate DLL required for Driver Booster execution<\/li>\n\n\n\n<li><strong>rtl120.bpl<\/strong>: Legitimate BPL required for Driver Booster execution<\/li>\n<\/ul>\n\n\n\n<p><strong>Second campaign<\/strong><\/p>\n\n\n\n<p>SCILabs identified this campaign, which, similar to the first one, targets users in Colombia. It was distributed through phishing emails using the pretext of a legal citation impersonating the \u201c<em>Juzgado Tercero Laboral del Circuito<\/em>\u201d of Colombia.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-2.png\" alt=\"\" class=\"wp-image-1441\"\/><figcaption class=\"wp-element-caption\">Image 3. Second campaign phishing email template<\/figcaption><\/figure><\/div>\n\n\n<p>This email had an attached SVG file displaying a message that encouraged the victim to download a file related to a supposed citation through a PDF file icon. Within the same email, the attacker provides a password for opening the PDF file as a mechanism to evade automated analysis by AV solutions and <a href=\"https:\/\/www.proofpoint.com\/es\/threat-reference\/sandbox\">sandboxes<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-3.png\" alt=\"\" class=\"wp-image-1442\"\/><figcaption class=\"wp-element-caption\">Image 4. SVG template attached to phishing email<\/figcaption><\/figure><\/div>\n\n\n<p>Once the victim clicks on the link, a compressed file is automatically downloaded from Dropbox. Similar to the previous campaign, a ZIP file by the name \u201c<em>01-CITACION DEMANDA EN SU CONTRA -JUZGADO PENAL 01 CIRCUITO ESPECIALIZADO EXTINXION-01.zip<\/em>\u201d is downloaded.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-4.png\" alt=\"\" class=\"wp-image-1443\"\/><figcaption class=\"wp-element-caption\">Image 5. File download from Dropbox<\/figcaption><\/figure><\/div>\n\n\n<p>Within the ZIP file we found the following artifacts:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-5.png\" alt=\"\" class=\"wp-image-1444\"\/><figcaption class=\"wp-element-caption\">Image 6. Files found in the compressed file<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>01 NOTIFICACION DEMANDA.exe<\/strong>: Legitimate <a href=\"https:\/\/www.itopvpn.com\/\">iTOP<\/a> <a href=\"https:\/\/www.itopvpn.com\/dualsafe-password-manager\">DualSafe Password Manager<\/a> executable developed in Delphi<\/li>\n\n\n\n<li><strong>barrette.accdb<\/strong>: Encoded Shellcode (<em>IDATLoader<\/em>)<\/li>\n\n\n\n<li><strong>aigret.eps<\/strong>: <em>AsyncRAT <\/em>encrypted payload (encrypted by <em>IDATLoader<\/em>)<\/li>\n\n\n\n<li><strong>vcl120.bpl<\/strong>: Malicious BPL. Loads the first payload into DualSafe Password Manager executable<\/li>\n\n\n\n<li><strong>madbasic_.bpl:<\/strong> Legitimate BPL required for DualSafe Password Manager execution.<\/li>\n\n\n\n<li><strong>maddisAsm_.bpl:<\/strong> Legitimate BPL required for DualSafe Password Manager execution.<\/li>\n\n\n\n<li><strong>madexcept_.bpl:<\/strong> Legitimate BPL required for DualSafe Password Manager execution.<\/li>\n\n\n\n<li><strong>vclx120.bpl:<\/strong> Legitimate BPL required for DualSafe Password Manager execution.<\/li>\n\n\n\n<li><strong>rtl120.bpl:<\/strong> Legitimate BPL required for DualSafe Password Manager execution.<\/li>\n\n\n\n<li><strong>winrar-x64-701es.exe<\/strong>: Winrar legitimate executable; not used during the attack<\/li>\n<\/ul>\n\n\n\n<p><strong>Third campaign<\/strong><\/p>\n\n\n\n<p>In the third campaign, SCILabs identified the use of a Dropbox storage link hosting a ZIP file by the name \u201c<em>crowdstrike-hotfix.zip<\/em>\u201d, being this file sample the same as the one reported in <a href=\"https:\/\/www.crowdstrike.com\/blog\/likely-ecrime-actor-capitalizing-on-falcon-sensor-issues\/\">Crowdstrike\u2019s Blog<\/a> . According to their post, the distribution method remains unknown and is likely part of a malware campaign targeting LATAM, leveraging a CrowdStrike update pretext as a result from the <a href=\"https:\/\/www.crowdstrike.com\/blog\/falcon-update-for-windows-hosts-technical-details\/\">Crowdstrike failure<\/a> on July 19<sup>th<\/sup>, 2024. This sample contains a file by the name \u201c<em>instrucciones.txt<\/em>\u201d, where the attacker provides alleged steps for executing a file patch. In reality, these instructions lead the victim to execute a malicious file that initiates the infection.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-6.png\" alt=\"\" class=\"wp-image-1445\"\/><figcaption class=\"wp-element-caption\">Image 7. Extract from the file \u201c<em>instrucciones.txt<\/em>\u201d<\/figcaption><\/figure><\/div>\n\n\n<p>The zip file contains the following artifacts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><u>Setup.exe<\/u><\/strong>: Legitimate iTOP <a href=\"https:\/\/www.itopvpn.com\/data-recovery-software\">Data Recovery Backup<\/a> executable developed in Delphi<\/li>\n\n\n\n<li><strong><u>battuta.flv<\/u><\/strong>: Encoded Shellcode (<em>IDATLoader<\/em>)<\/li>\n\n\n\n<li><strong><u>maidenhair.cfg<\/u><\/strong>: <em><a href=\"https:\/\/www.incibe.es\/servicio-antibotnet\/info\/Remcos\">Remcos<\/a><\/em> encrypted payload (encrypted by <em>IDATLoader<\/em>)<\/li>\n\n\n\n<li><strong><u>vcl120.bpl<\/u><\/strong>: Malicious BPL. Loads the first payload into Data Recovery Backup executable<\/li>\n\n\n\n<li><strong>madbasic_.bpl:<\/strong> Legitimate BPL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>maddisAsm_.bpl:<\/strong> Legitimate BPL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>madexcept_.bpl:<\/strong> Legitimate BPL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>vclx120.bpl:<\/strong> Legitimate BPL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>rtl120.bpl:<\/strong> Legitimate BPL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>sqlite3.dll<\/strong>: Legitimate DLL required for Data Recovery Backup execution<\/li>\n\n\n\n<li><strong>datastate.dll<\/strong>: Legitimate DLL required for Data Recovery Backup execution<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-7.png\" alt=\"\" class=\"wp-image-1446\"\/><figcaption class=\"wp-element-caption\">Image 8. Files contained in compressed file<\/figcaption><\/figure><\/div>\n\n\n<p><strong>Analysis of BPL Side-Loading technique in conjunction with <em>IDATLoader<\/em><\/strong><\/p>\n\n\n\n<p>BPL Side-Loading is a technique mentioned among the Hijack Execution Flow: DLL <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\/\">techniques<\/a> registered in the MITRE ATT&amp;K framework; however, it does not have an official categorization at the time of writing this post.<\/p>\n\n\n\n<p>A <a href=\"http:\/\/docwiki.embarcadero.com\/RADStudio\/Athens\/\/en\/Package_Dynamic_Library_File\">BPL<\/a> (Borland Package Library) file is a package file used by Borland software development tools, such as Delphi and C++ Builder. These files are similar to dynamic link libraries (DLLs) but are specifically designed for applications developed in the aforementioned environments. Like DLLs, BPL files can be loaded dynamically at runtime, allowing applications to extend their functionality without requiring recompilation.<\/p>\n\n\n\n<p>Considering the above, the BPL Side-Loading technique is based on the dependency of applications on external BPL libraries, which can be exchanged or manipulated to load other artifacts into memory, much like <a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\">DLL Side-Loading<\/a>.<\/p>\n\n\n\n<p>The initial artifact is a legitimate executable that must be launched by the user to continue the attack flow. It is developed in Delphi and requires BPL libraries to function, as is the case with the <a href=\"https:\/\/www.itopvpn.com\/data-recovery-software\">Data Recovery Backup<\/a>, <a href=\"https:\/\/www.itopvpn.com\/dualsafe-password-manager\">DualSafe Password Manager<\/a>, and <a href=\"https:\/\/www.iobit.com\/es\/recommend\/dbfree.php\">Driver Booster<\/a> applications, which are vulnerable to this technique.<\/p>\n\n\n\n<p>When executed, the libraries required for the application to function are imported by name; therefore, a legitimate BPL library can be easily replaced by one that has been modified by the attacker. In the analyzed campaigns, the malicious file \u201c<em>vcl120.bpl<\/em>\u201d was found in the same directory as the executable, being a malicious BPL tailored by the attacker.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-8.png\" alt=\"\" class=\"wp-image-1447\"\/><figcaption class=\"wp-element-caption\">Image 9. Modules imported by the executable file<\/figcaption><\/figure><\/div>\n\n\n<p>The executable then imports functions from the malicious BPL library; in this case, the file \u201c<a href=\"https:\/\/www.opendll.com\/index.php?file-download=vcl120.bpl&amp;arch=32bit&amp;version=12.0.3210.17555\"><em>vcl120.bpl<\/em><\/a>\u201d. This library has been previously modified by the threat actor to import artifacts that do not correspond to its regular operation. This is where malware called <em><a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/technical-analysis-hijackloader\">HijackLoader<\/a><\/em> or <em>IDATLoader<\/em> is executed, which begins to read the contents of a file containing the main shellcode and corresponding to the main <em>IDATLoader<\/em> module. In these campaigns, the names of these files are \u201c<em>barrette.accdb<\/em>\u201d, \u201c<em>dreamland.m4a<\/em>\u201d, and \u201c<em>battuta.flv<\/em>\u201d. In the example shown in the following image, the name is \u201c<em>dreamland.m4a<\/em>\u201d.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-9.png\" alt=\"\" class=\"wp-image-1448\"\/><figcaption class=\"wp-element-caption\">Image 10. Code abstract from &#8220;<em>vcl120.bpl<\/em>&#8221; file, used to load <em>IDATLoader<\/em> shellcode<\/figcaption><\/figure><\/div>\n\n\n<p>It is important to mention that in the three campaigns analyzed, the BPL Side-Loading technique has been used in conjunction with the <em>IDATLoader<\/em> malware.<\/p>\n\n\n\n<p><em>IDATLoader<\/em> is modular in nature, so its loading into memory begins with the main shellcode but consists of different stages. During the analysis, the following were identified:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Copying artifacts<\/strong>: Copies the files needed to execute the BPL Side-Loading technique in conjunction with the <em>IDATLoader<\/em> malware, regardless of whether they are malicious or legitimate, to a directory other than where the execution takes place. The directory depends on the operator&#8217;s choice; however, the following paths were identified in these campaigns:\n<ul class=\"wp-block-list\">\n<li>C:\\Users\\[User]\\AppData\\Local<\/li>\n\n\n\n<li>C:\\Users\\[User]\\AppData\\Roaming<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-10.png\" alt=\"\" class=\"wp-image-1449\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-11.png\" alt=\"\" class=\"wp-image-1450\"\/><figcaption class=\"wp-element-caption\">Image 11. Artifacts copied in different directories<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Persistence<\/strong>: Generates persistence by creating shortcuts in the C:\\Users\\[User]\\AppData\\Roaming \\Microsoft\\Windows\\Start Menu\\Programs\\Startup folder.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-12.png\" alt=\"\" class=\"wp-image-1451\"\/><figcaption class=\"wp-element-caption\">Image 12. Usage of shortcuts as persistence in startup folder<\/figcaption><\/figure><\/div>\n\n\n<p>Persistence through scheduled tasks was also observed:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-13.png\" alt=\"\" class=\"wp-image-1452\"\/><figcaption class=\"wp-element-caption\">Image 13. Persistence through scheduled tasks<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Payload decryption<\/strong>: The file containing the <em>IDATLoader<\/em> payload is easy to identify because its encryption technique includes the word \u201cIDAT\u201d to segment the content; in the campaigns analyzed, these are the artifacts named \u201c<em>cutcherry.vcf<\/em>\u201d, \u201c<em>aigret.eps<\/em>\u201d, and \u201c<em>maidenhair.cfg<\/em>\u201d. Each segment is decrypted individually using the XOR operator with a key located immediately after the first \u201cIDAT\u201d flag. The decrypted segments are then joined and decompressed using the <a href=\"https:\/\/learn.microsoft.com\/en-us\/openspecs\/windows_protocols\/ms-xca\/5655f4a3-6ba4-489b-959f-e1f407c52f15\">LZNT1 algorithm<\/a>.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-14.png\" alt=\"\" class=\"wp-image-1453\"\/><figcaption class=\"wp-element-caption\">Image 14. Encrypted payload abstract<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Payload loading<\/strong>: Using advanced techniques known as <a href=\"https:\/\/attack.mitre.org\/techniques\/T1055\/013\/\">Process Doppelg\u00e4nging<\/a> and <a href=\"https:\/\/sachiel-archangel.medium.com\/analysis-of-heavens-gate-part-1-62cca0ace6f0\">Heaven&#8217;s Gate<\/a>, it loads the already decrypted content into a process started with elevated privileges. In the case of the campaigns analyzed, the <em>AsyncRAT<\/em> and the <em>Remcos<\/em> Trojan are loaded into the MSBuild.exe or explorer.exe processes.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-15.png\" alt=\"\" class=\"wp-image-1454\"\/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-16.png\" alt=\"\" class=\"wp-image-1455\"\/><figcaption class=\"wp-element-caption\">Image 15. MSBuild.exe and explorer.exe process injection<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Trace removal<\/strong>: Once the payload is loaded and executed, it deletes the main shellcode from memory and terminates unnecessary processes, leaving only those processes active that are necessary for the payload (Trojan) to function.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/11\/image-17.png\" alt=\"\" class=\"wp-image-1456\"\/><figcaption class=\"wp-element-caption\">Image 16. Final payload infected process without process parent dependency<\/figcaption><\/figure><\/div>\n\n\n<p>At the end of this process, the payload executes actions corresponding to its operation similar to other campaigns. These actions include creating new persistence as in the case of <em>AsyncRAT<\/em> and establishing communications with the command-and-control (C2). Additionally, <em>IDATLoader<\/em> retains the persistence generated during execution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack chain summary<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The user receives a phishing email using different pretexts, such as alleged lawsuits, court summonses, or even software patches.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The email may contain attachments with links that automatically download a compressed file, or it may directly contain a compressed ZIP or 7ZIP file as an attachment. It is important to note that this distribution method is not exclusive, and malware using this technique could also be distributed through <a href=\"https:\/\/www.malwarebytes.com\/es\/malvertising\">malvertising<\/a>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attached compressed file contains various artifacts, but if the user decompresses and executes the single executable file, it initiates the BPL Side-Loading technique in conjunction with the <em>IDATLoader<\/em> malware, the steps of which are summarized below:<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The legitimate executable file loads a BPL module that has been modified by the operators.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The BPL module loads and injects into memory a shellcode found in another artifact.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The shellcode, which corresponds to the main module of <em>IDATLoader<\/em>, copies the artifacts to a new directory, generates persistence, and, using Process Doppelg\u00e4nging and Heaven&#8217;s Gate techniques, decrypts, decompresses, and loads the final payload into a new process.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Once the final payload is executed, all unnecessary processes are terminated.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Finally, the final payload executes its intended malicious activities.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Attack chain process<\/h2>\n\n\n\n<p>The following attach chain was recorded by SCILabs after analyzing the previous campaigns disclosed in this post.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/12\/BLPSideLoadingImage-929x1024.png\" alt=\"\" class=\"wp-image-1578\"\/><figcaption class=\"wp-element-caption\">Image 17. Attack chain process identified by SCILabs<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">TTPs aligned with MITRE ATT&amp;CK\u00ae framework<\/h2>\n\n\n\n<p>The following TTP matrix, based on the MITRE Framework, was crafted from the analysis of the use of the BPL Side-Loading technique in conjunction with the <em>IDATLoade<\/em>r malware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/wp-content\/uploads\/2025\/12\/BLPSideLoadingTTPsMatrix-1024x954.png\" alt=\"\" class=\"wp-image-1579\"\/><figcaption class=\"wp-element-caption\">Table 1. TTP matrix based on the MITRE ATT&amp;CK\u00ae Framework<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The BPL Side-Loading technique is an example of how threat actors are constantly evolving and developing new techniques to evade security tools with the aim of distributing malware, taking advantage of organizations and users that are insufficiently informed or prepared to address emerging threats.<\/p>\n\n\n\n<p>As mentioned in this post, this technique has been used since its discovery by various threat actors in LATAM. SCILabs believes that the number of threat actors using BPL Side-Loading and <em>IDATLoader<\/em> in their malware campaigns targeting the region will increase in the coming months due to a general lack of awareness of how it works among organizations and some manufacturers.<\/p>\n\n\n\n<p>SCILabs provides the following recommendations to avoid falling victim to this technique or, if prevention is not possible, to mitigate its impact.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block the IoCs mentioned at the end of this publication<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform awareness campaigns on the techniques used by different threat actors in the region, such as Red Akodon, to distribute their campaigns<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Have strict security policies regarding the use and installation of software on corporate computers, especially utilities related to applications developed in Delphi that are not necessary for operations, such as Data Recovery Backup, DualSafe Password Manager, and Driver Booster<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In the case of phishing emails:\n<ul class=\"wp-block-list\">\n<li>Avoid opening emails from unknown senders<\/li>\n\n\n\n<li>Avoid opening suspicious links<\/li>\n\n\n\n<li>Avoid opening or downloading suspicious files<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep operating systems and software of all devices on your network up to date.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure that In-Depth Security is correctly implemented on all systems in the organization.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting tasks to search for suspicious artifacts, mainly in the following paths:\n<ul class=\"wp-block-list\">\n<li>C:\\Users\\[User]\\AppData\\Local<\/li>\n\n\n\n<li>C:\\Users\\[User]\\AppData\\Roaming<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting tasks in search of shortcuts within the path C:\\Users\\[User]\\AppData\\ Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting activities to identify persistence mechanisms and anomalous behavior, including suspicious scheduled tasks and processes not initiated by the user\u2014particularly <strong>cmd.exe<\/strong>, <strong>conhost.exe<\/strong>, <strong>MSBuild.exe<\/strong>, and <strong>explorer.exe<\/strong>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Perform threat hunting tasks to search for possible infections from other types of malwares such as infostealers, banking Trojans, RATs, or ransomware, among others.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pay attention to changes in your devices, such as a double cursor, pop-up screens, among others.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Indicators of Compromise<\/h2>\n\n\n\n<p><strong>SHA256 Hashes<\/strong><\/p>\n\n\n\n<p>4A3BBDB727E0E8FC2B41D5EBB8F7887DEFD468AF19AC76E94B7F452E668555CD<\/p>\n\n\n\n<p>C44506FE6E1EDE5A104008755ABF5B6ACE51F1A84AD656A2DCCC7F2C39C0ECA2<\/p>\n\n\n\n<p>ED88B5C4A8BE75F5DA0400817A9514BDCB38E602AA3FE463D39CEC523DCD3268<\/p>\n\n\n\n<p>6768F27CADD154E4F98704F815901825550609B11D2A3F871AA3DB97D351DC52<\/p>\n\n\n\n<p>D19F51871484CC4A737196BDB048193AD73F7F6BD061EC813766516EBA26E406<\/p>\n\n\n\n<p>1DD7AE853911217095D2254337BEDECEE7267EEA1AC9D0840EAF13506F40C9AB<\/p>\n\n\n\n<p>B6F321A48812DC922B26953020C9A60949EC429A921033CFAF1E9F7D088EE628<\/p>\n\n\n\n<p>F923B85549CF4D2F87C11F4CDEB5ABB408974AEA8235AA68ACC849736EBDDE28<\/p>\n\n\n\n<p>0F6B87DB9F0AE16D439B92514B3A63AE294AB5232901BBD8D87F14BE47F7A67C<\/p>\n\n\n\n<p>BE074196291CCF74B3C4C8BD292F92DA99EC37A25DC8AF651BD0BA3F0D020349<\/p>\n\n\n\n<p>B3ABDC2B792CB4B0160BDCC291DCB13B31078D852BD20AE01AE0908A0B46B72F<\/p>\n\n\n\n<p>BB83ECBDD3C3DD6EC0A63B4C0CB480EDB748165ED3A4A8720CB6605AC7173A6C<\/p>\n\n\n\n<p>931308CFE733376E19D6CD2401E27F8B2945CEC0B9C696AEBE7029EA76D45BF6<\/p>\n\n\n\n<p><strong>Malware delivery URLs<\/strong><\/p>\n\n\n\n<p>We recommend blocking the full URL in order to avoid false positives or operative disturbances.<\/p>\n\n\n\n<p>hxxps[:]\/\/www[.]google[.]com\/url?q=hxxps[:]\/\/www[.]dropbox[.]com\/scl\/fi\/zi9ad2pp8gdqv2j5ajuda\/01-CITACION-DEMANDA-EN-SU-CONTRA-JUZGADO-PENAL-01-CIRCUITO-ESPECIALIZADO-EXTINXION-01[.]zip?rlkey%3Dra9x4qs1mg7r7prxh0qbhjh08%26st%3Ds5ausk7x%26dl%3D1&amp;sa=D&amp;source=editors&amp;ust=1721672080375620&amp;usg=AOvVaw1Cb3A9CMaa_JCWCYpBDIuT<\/p>\n\n\n\n<p>hxxps[:]\/\/www[.]dropbox[.]com\/scl\/fi\/zi9ad2pp8gdqv2j5ajuda\/01-CITACION-DEMANDA-EN-SU-CONTRA-JUZGADO-PENAL-01-CIRCUITO-ESPECIALIZADO-EXTINXION-01[.]zip?rlkey%3Dra9x4qs1mg7r7prxh0qbhjh08%26st%3Ds5ausk7x%26dl%3D1&amp;sa=D&amp;source=editors&amp;ust=1721672080375620&amp;usg=AOvVaw1Cb3A9CMaa_JCWCYpBDIuT<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The purpose of this post is to provide information on a technique disclosed in May of 2024 and recorded<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,1],"tags":[],"class_list":["post-1490","post","type-post","status-publish","format-standard","hentry","category-malware","category-operation","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=1490"}],"version-history":[{"count":3,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1490\/revisions"}],"predecessor-version":[{"id":1493,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/1490\/revisions\/1493"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=1490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=1490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=1490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}