{"id":293,"date":"2022-08-30T17:33:45","date_gmt":"2022-08-30T17:33:45","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=293"},"modified":"2022-08-30T17:33:45","modified_gmt":"2022-08-30T17:33:45","slug":"new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2022\/08\/30\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/","title":{"rendered":"New BlackDog malware: Man-in-the-Browser malware campaign targeting Mexico"},"content":{"rendered":"<h1 style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-337\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/MicrosoftTeams-image-3.jpg\" alt=\"BlackDog Logo\" width=\"280\" height=\"280\" \/><\/h1>\n<h1><a name=\"_Toc80194996\"><\/a><strong>Overview<\/strong><\/h1>\n<p>Between the last week of June and the third one of August, SCILabs identified a new malware campaign \u00a0which is being distributed through phishing emails under the pretext of supposed invoices to perform <em>Man-in-the-Browser<\/em> attacks using domains such as <strong><em>kawaitravelmexico[.]com<\/em><\/strong> and <strong><em>facturamx[.]club<\/em><\/strong> supplanting the <em>Servicio de Administraci\u00f3n Tributaria (SAT) in Mexico <\/em>and impersonating sites like hxxp[:]\/\/www[.]sat[.]gob[.]mx.<\/p>\n<p>Its main objective is to steal information from users of financial institutions, by injecting code into the Chrome browser, via a malicious extension.<\/p>\n<p>During about five weeks, SCILabs has continued monitoring activities and identified mainly two variants of this campaign that, due to its characteristics, we named <strong><em>BlackDog<\/em><\/strong>. SCILabs carried out multiple investigations to determine if there is any relationship between this malware and other families like <em>Magnant<\/em>, <em>BokBot<\/em>, <em>Chaes<\/em>, and <em>Kronos<\/em><em>;<\/em> however, we found no relationship between them.<\/p>\n<p>Finally, it is essential to mention that the artifacts identified by SCILabs used in the infection chain have a low detection rate by antivirus solutions in the <em>VirusTotal <\/em>platform.<\/p>\n<h1><strong>How could it affect an organization?<\/strong><\/h1>\n<p>The main objective of this campaign is to perform a <strong><em>Man-in-The-Browser<\/em> <\/strong>attack to steal banking information from all types of users. During the infection chain, the attackers could use the droppers identified by SCILabs to download more dangerous malware like ransomware.<\/p>\n<p>If an attack by this malware is successful, it could cause economic and reputation losses; additionally, cybercriminals could misuse the obtained data by leaking or selling it on underground forums or on the black market.<\/p>\n<h1><strong>Analysis<\/strong><\/h1>\n<h4><strong>Threat Context of the first campaign analyzed in June 2022<\/strong><\/h4>\n<p>SCILabs identified, in open sources, the <strong><em>facturamx[.]club<\/em><\/strong> domain simulating to be a billing site from Mexico and when carrying out the investigation we recovered the artifact with which the chain of infection began.<\/p>\n<p>The first malicious artifact identified by SCILabs was <strong>feb.hta<\/strong>, downloaded from <strong><em>facturemx[.]mx\/feb.hta<\/em><\/strong> and corresponds to an HTML template with an embedded VBS-type obfuscated script.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-296\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_1.png\" alt=\"First stage of malware\" width=\"790\" height=\"233\" \/><\/p>\n<p style=\"text-align: center\">Figure 1 &#8211; First stage of the malware (HTA file)<\/p>\n<p>If the victim opens the <strong><em>.hta<\/em><\/strong> file, it runs an obfuscated <em>PowerShell<\/em> script that aims to download and execute the third stage of the malware.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-297\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_2.png\" alt=\"Obfuscated PowerShell script\" width=\"831\" height=\"414\" \/><\/p>\n<p style=\"text-align: center\">Figure 2 &#8211; Obfuscated PowerShell script &#8211; Second stage of the malware<\/p>\n<p>The malware creates a scheduled task to execute the file corresponding to the third stage of infection, which is an obfuscated <strong><em>.jse<\/em><\/strong> (JScript Encoded Script Format) type file, that aims to generate persistence and download the artifacts of the fourth stage of the attack.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-298\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_3.png\" alt=\"Schedule task to execute the third stage of malware\" width=\"741\" height=\"258\" \/><\/p>\n<p style=\"text-align: center\">Figure 3 &#8211; Schedule task to execute the third stage of the malware<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-300\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_4.png\" alt=\"Third stage of malware (JSE file)\" width=\"810\" height=\"259\" \/><\/p>\n<p style=\"text-align: center\">Figure 4 &#8211; Third stage of the malware (JSE file)<\/p>\n<p>The <strong><em>.jse<\/em><\/strong> artifact aims to download the following files:<\/p>\n<ul>\n<li><strong>json: <\/strong>The manifest file in <em>JSON<\/em> format contains information about the malicious Google Chrome extension.<\/li>\n<li><strong>seguro<\/strong><strong>.js: <\/strong>Google Chrome extension developed with obfuscated JavaScript code.<\/li>\n<li><strong>Screenshotfrom202034-58.png: <\/strong>PNG file-type simulating a bank transfer.<\/li>\n<li><strong>lnk <\/strong>and<strong> Chrome1.lnk: <\/strong>Google Chrome shortcut used by the attacker to generate persistence and load the malicious extension via the <strong><em>&#8211;load-extension<\/em><\/strong> parameter to perform the <strong><em>Man-in-the-Browser <\/em><\/strong>attack.<\/li>\n<\/ul>\n<p>The <strong><em>.jse<\/em><\/strong> file opens the <strong><em>Screenshotfrom202034-58.png<\/em><\/strong> file in full screen using <em>rundll32<\/em> while dropping the <strong><em>.lnk<\/em><\/strong> files to generate persistence in the Windows <em>Startup<\/em> path and installing the <strong><em>&#8220;Seguridad&#8221;<\/em><\/strong> Google Chrome extension.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-301\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_5.png\" alt=\"Opened full screen via rundll32 (PNG file)\" width=\"843\" height=\"57\" \/><\/p>\n<p style=\"text-align: center\">Figure 5 &#8211; Opened full screen via rundll32 (PNG file)<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-302\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_6.png\" alt=\"PNG file simulating a bank transfer\" width=\"717\" height=\"467\" \/><\/p>\n<p style=\"text-align: center\">Figure 6 &#8211; PNG file simulating a bank transfer<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-303\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_7.png\" alt=\"LNK files dropped in the Startup path\" width=\"689\" height=\"145\" \/><\/p>\n<p style=\"text-align: center\">Figure 7 &#8211; LNK files dropped in the <em>Startup<\/em> path<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-304\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_8.png\" alt=\"LNK file loading attacker extension\" width=\"633\" height=\"396\" \/><\/p>\n<p style=\"text-align: center\">Figure 8 &#8211; LNK file loading attacker extension<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-306\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_9.png\" alt=\"Attacker extension dropped in %LOCALAPPDATA% path\" width=\"530\" height=\"223\" \/><\/p>\n<p style=\"text-align: center\">Figure 9 &#8211; Attacker extension dropped in %LOCALAPPDATA% path<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-307\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_10.png\" alt=\"Obfuscated JS file (Seguro.js)\" width=\"646\" height=\"341\" \/><\/p>\n<p style=\"text-align: center\">Figure 10 &#8211; Obfuscated JS file (Seguro.js)<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-308\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_11.png\" alt=\"Attacker Google Chrome extension\" width=\"639\" height=\"183\" \/><\/p>\n<p style=\"text-align: center\">Figure 11 &#8211; Attacker Google Chrome extension<\/p>\n<p>If the victim opens the Chrome browser after the attacker installs the malicious extension, the <strong><em>MitB<\/em><\/strong> attack begins. The extension aims to inject an external request to a <em>JavaScript<\/em> resource into the <em>DOM<\/em> of the pages visited by the user.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-310\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_12.png\" alt=\"External JS resource injected by malicious extension\" width=\"855\" height=\"38\" \/><\/p>\n<p style=\"text-align: center\">Figure 12 &#8211; External JS resource injected by malicious extension<\/p>\n<p>The external resource injected by the malicious extension contains URL checks to identify which banking page the victim is on. Another script calls an external resource, depending on the banking site that the user is visiting.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-311\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_13.png\" alt=\"Forth stage of the malware\" width=\"817\" height=\"338\" \/><\/p>\n<p style=\"text-align: center\">Figure 13 &#8211; Forth stage of the malware (8vZ9d1-ad.js resource)<\/p>\n<p>For each banking site in the <strong><em>8vZ9d1-ad.js<\/em><\/strong> script, the attacker built a script with <em>JavaScript<\/em> code that injects fake HTML templates into the <em>DOM<\/em> of the visited bank pages.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-312\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_14.png\" alt=\"Custom JS code for Citibanamex fake page\" width=\"808\" height=\"252\" \/><\/p>\n<p style=\"text-align: center\">Figure 14 &#8211; Custom JS code for <em>Citibanamex<\/em> fake page<\/p>\n<p>Once all the malicious code is injected, the victim will see a replica of the legitimate banking page in their browser, and the information the user enters is sent to the attacker&#8217;s C2 server.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-313\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_15.png\" alt=\"Injecting malicious code process\" width=\"792\" height=\"287\" \/><\/p>\n<p style=\"text-align: center\">Figure 15 &#8211; Injecting malicious code process<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-314\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_16.png\" alt=\"Fake form showed by the attacker \" width=\"731\" height=\"357\" \/><\/p>\n<p style=\"text-align: center\">Figure 16 &#8211; Fake form showed by the attacker after user ingresses data<\/p>\n<p>SCILabs hypothesizes that the attacker could be carrying out targeted attacks on employees of different companies because the image used as a pretext in the chain of infection contains the name of a specific person and company.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-315\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_17.png\" alt=\"Information found in the image used in the infection chain\" width=\"691\" height=\"74\" \/><\/p>\n<p style=\"text-align: center\">Figure 17 &#8211; Information found in the image used in the infection chain<\/p>\n<h4><strong>Threat Context of the second campaign analyzed in August 2022<\/strong><\/h4>\n<p>We identified in open sources the <strong><em>https[:]\/\/www[.]kawaitravelmexico[.]com\/SAT[-]Portal[-]Descargas[-]Actualizacion[-]Tributaria<\/em><\/strong> domain during the security monitoring in LATAM, as shown in the following images.<\/p>\n<p>In the apocryphal website, SCILabs found inconsistencies in the domain name and the registered contact name in the <em>who.is<\/em> database. We also encountered writing errors, as shown in the following image.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-316\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_18.png.jpg\" alt=\"Apocryphal website vs Legitimate website\" width=\"731\" height=\"470\" \/><\/p>\n<p style=\"text-align: center\">Figure 18 &#8211; Apocryphal website observed during security monitoring (left) vs Legitimate website (right)<\/p>\n<p>If the user does click on the \u201c<em>Descargar<\/em>\u201d button, the website downloads a compressed file in zip format called \u201c<em>SAT_Policy2022.zip\u201d<\/em> which contains a JavaScript file called <em>\u201cSAT_Policy.js\u201d.<\/em><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-317\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_19.png\" alt=\"Compressed file downloaded from the impersonated site\" width=\"643\" height=\"89\" \/><\/p>\n<p style=\"text-align: center\">Figure 19 &#8211; Compressed file downloaded from the impersonated site<\/p>\n<p>Once the first dropper is executed, the infection chain described in the previous investigations begins.<\/p>\n<h4><strong>Most important changes between the August campaign and the June campaign<\/strong><\/h4>\n<p>SCILabs observed the following during the execution of the malware:<\/p>\n<ul>\n<li>The infrastructure has changed, and the first dropper is now a JavaScript file to reduce the flow attack and make the infection faster.<\/li>\n<li>If a user enters their data, it will be sent to the cybercriminal&#8217;s server, and the malware will display a pop-up window with a button to download an executable. If the user clicks on &#8220;<em>Descargar Asistencia Bancanet <\/em>&#8221; <em>(The message changes depending on the bank)<\/em> they will be redirected to the official TeamViewer page, and the download will start automatically.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-318\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_20.png\" alt=\"Pop-ups deployed to download an assistance software\" width=\"668\" height=\"249\" \/><\/p>\n<p style=\"text-align: center\">Figure 20 \u2013 Pop-ups deployed to download an assistance software (I)<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-319\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_21.png\" alt=\"Pop-ups deployed to download an assistance software\" width=\"558\" height=\"441\" \/><\/p>\n<p style=\"text-align: center\">Figure 21 \u2013 Pop-ups deployed to download an assistance software (II)<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-320\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_22.png\" alt=\"Auto download of TeamViewer\" width=\"761\" height=\"362\" \/><\/p>\n<p style=\"text-align: center\">Figure 22 \u2013 Auto download of TeamViewer<\/p>\n<p>After analyzing the downloaded executable, SCILabs determined that it is a legitimate tool and no malicious behavior was observed, so SCILabs has two hypotheses about it:<\/p>\n<ul>\n<li>It is an update of the previous campaign, to make it more effective by generating greater confidence in the victim.<\/li>\n<li>Downloading this tool suggests that in the future, the cybercriminal will use social engineering techniques to obtain TeamViewer credentials and thus get remote control of the victim\u2019s computer.<\/li>\n<\/ul>\n<p>In the latest campaign, the attacker is using a template to steal victims\u2019 email credentials.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-321\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_23.png\" alt=\"Template to steal email credentials\" width=\"668\" height=\"357\" \/><\/p>\n<p style=\"text-align: center\">Figure 23 \u2013 Template to steal email credentials<\/p>\n<p>During the investigation, SCILabs observed a new evasion defense mechanism; when trying to inspect the code of visited websites in the Chrome browser infected, it automatically enables the debugger and prevents further analysis, because the malicious code contains an infinite loop to enable the debugger and pause it.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-322\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/figura_24.png\" alt=\"Code inspector with auto debugging\" width=\"851\" height=\"359\" \/><\/p>\n<p style=\"text-align: center\">Figure 24 \u2013 Code inspector with auto debugging<\/p>\n<h1><strong>Attack Flows<\/strong><\/h1>\n<p>The following image describes the attack flow observed during <strong>June<\/strong>:<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-326\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/attack_flow_1.png\" alt=\"Attack flow of the first sample recovered by SCILabs\" width=\"873\" height=\"327\" \/><\/p>\n<p style=\"text-align: center\">Figure 25 \u2013 Attack flow of the first sample recovered by SCILabs<\/p>\n<p>The image below describes the attack flow of the variant observed during <strong>August<\/strong>:<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-327\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/attack_flow_2.png\" alt=\"Attack flow of the variant recovered by SCILabs\" width=\"784\" height=\"386\" \/><\/p>\n<p style=\"text-align: center\">Figure 26 \u2013 Attack flow of the variant recovered by SCILabs<\/p>\n<h1><strong>Technical Summary<\/strong><\/h1>\n<ul>\n<li>Initial access is probably carried out through phishing emails impersonating the <em>Secretaria de Administraci\u00f3n Tributaria <\/em>from Mexico that encourages victims to download and install a malicious artifact with which the chain of infection begins.<\/li>\n<li>The main page gives instructions to download and install the first dropper.<\/li>\n<li>An image impersonating a banking transfer (probably used as a distraction and motivator for the user to enter their online banking data) is displayed on the screen after executing the first dropper.<\/li>\n<li>The <strong><em>.hta<\/em><\/strong> file contains obfuscated <em>VBS<\/em> code that runs <em>PowerShell<\/em> functions that aim to download the <strong><em>php#.jse<\/em><\/strong> file to the <strong><em>%appdata%\/Roaming<\/em><\/strong> path and create a scheduled task to run it.<\/li>\n<li>The <strong><em>js <\/em><\/strong>or <strong><em>feb.php#.jse<\/em><\/strong> file according to the case contains obfuscated code that drops a malicious <strong><em>Google Chrome<\/em><\/strong> extension to the <strong><em>%localappdata%<\/em><\/strong> path along with its manifest file, an image to the <strong><em>%localappdata%\/Temp<\/em><\/strong> path that spoofs a transfer receipt, and two <strong><em>Google Chrome<\/em><\/strong> shortcuts in the <strong><em>Startup<\/em><\/strong> path that aims to load the malicious extension on each run.<\/li>\n<li>When the <strong><em>.js<\/em><\/strong> file is executed through <strong><em>rundll32<\/em><\/strong>, the image of the false receipt is displayed on full screen, and persistence is generated in the Windows <strong><em>Startup<\/em><\/strong> path through the direct accesses released. In addition, the malicious extension that aims to carry out the <strong><em>MitB<\/em><\/strong> attack is installed in the <em>Google Chrome<\/em><\/li>\n<li>If the victim opens the Google Chrome browser and visits a banking page, the <strong><em>8vZ9d1-ad.js<\/em><\/strong> resource is injected into the visited website&#8217;s DOM.<\/li>\n<li>The <strong><em>8vZ9d1-ad.js<\/em><\/strong> JavaScript resource contains calls to other external resources depending on the banking site that the victim visits to display a template that impersonates the banking website.<\/li>\n<li>Finally, if the victim enters information, it is sent to the attacker\u2019s server.<\/li>\n<\/ul>\n<h1><strong>Comparison between <em>BlackDog<\/em> campaigns and other well-known campaigns<\/strong><\/h1>\n<p>To determine if this is a new campaign, the SCILabs team investigated public sources on different campaigns and found similarities in some of them:<\/p>\n<ul>\n<li><strong><em>Magnant<\/em><\/strong><strong>:<\/strong> Use of EXE or ISO files for its installation. This threat has as its objective the installation of a backdoor using a malicious Chrome extension to steal bank credentials, it especially targets North America and Australia.<\/li>\n<li><strong><em>IceID Stelear<\/em><\/strong><strong> AKA <em>BokBot<\/em><\/strong>: Use malicious Office documents with macros to start the infection chain, typically distributed by phishing emails. In this case, the cybercriminals use images with steganography to perform different tasks during the attack flow targeting mainly the APAC region.<\/li>\n<li><strong><em>Chaes<\/em><\/strong>: This malware distribution is based on compromised sites to download and install a JavaScript that starts the infection chain, but in this case is only to prepare a python environment. It targets mainly Brazil, and some names of the installed files are written in Portuguese. It finally installs at least five malicious Chrome extensions to execute different tasks such as connections to C2, and marketplaces stealing credentials, among others.<\/li>\n<li><strong><em>Kronos<\/em><\/strong>: The execution is through EXE files. The cybercriminals use a similar phishing kit and code injection, but in this case, they also use images with steganography and a TOR environment to connect with their C2 server. There are no more overlaps between campaigns.<\/li>\n<\/ul>\n<p><strong>Note: <\/strong>The threats shown above were taken into consideration because they are also use JavaScript code or have <em>Plugins<\/em> written in this language.<\/p>\n<p>After this investigation, SCILabs team determined that despite the similarities, none of the campaigns analyzed used the same TTPs during their infection chain, so based on its characteristics, SCILabs named it <strong><em>BlackDog<\/em><\/strong>.<\/p>\n<h1><strong><span lang=\"EN-US\" style=\"font-size: 12.0pt;line-height: 115%\">TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/span><\/strong><\/h1>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-323\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/08\/tabla_1.png\" alt=\"TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework\" width=\"852\" height=\"411\" \/><\/p>\n<p style=\"text-align: center\">Table 1 &#8211; TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/p>\n<h1><a name=\"_Toc80195004\"><\/a><strong>Assessment<\/strong><\/h1>\n<p>SCILabs considers that the danger of this campaign lies in three main aspects:<\/p>\n<ul>\n<li>Quick update of its droppers and TTP during the infection chain.<\/li>\n<li>This threat could be used to deploy other types of more dangerous malware like ransomware that can cause more significant damage to organizations.<\/li>\n<li>The artifacts used have a very low detection rate by antivirus solutions.<\/li>\n<\/ul>\n<p>During the investigation of this threat, SCILabs noticed a notable group of characteristics that are not present in other campaigns, such as:<\/p>\n<ul>\n<li>The use and injection of JavaScript code; target only of Mexican users, probably distributed by phishing emails.<\/li>\n<li>Installation of a malicious Chrome extension.<\/li>\n<li>Man-in-the -Browser attack.<\/li>\n<li>The impersonation of legitimate sites of many Mexican banks.<\/li>\n<\/ul>\n<p>This attack could be especially effective because most users do not usually have control of the Google Chrome browser and its plugins or extensions.<\/p>\n<p>SCILabs believes that due to the effectiveness of the techniques used to carry out the Man-in-the-Browser attack, we will continue to see similar campaigns throughout the rest of the year.<\/p>\n<p>Finally, SCILabs recommends performing the following actions:<\/p>\n<ul>\n<li>Adding the indicators of compromise reflected in this report to your security solutions<\/li>\n<li>Conduct a threat hunting for malicious add-ons or extensions on company browsers<\/li>\n<li>Have a strict policy regarding using and installing plugins or extensions, especially in Google Chrome<\/li>\n<li>Look for suspicious files with names like <strong>js<\/strong>, <strong>8vZ9d1-ad.js<\/strong>, or <strong>SAT_Policy.js <\/strong><\/li>\n<li>Look for suspicious folders or files created under <strong>%APPDATA%<\/strong>, <strong>%LOCALAPPDATA%\/TEMP<\/strong>, and <strong>%LOCALAPPDATA%<\/strong><\/li>\n<li>Search for Chrome browser shortcuts that use the <em>&#8211;load-extension<\/em> parameter to execute malicious code or extensions.<\/li>\n<\/ul>\n<p>It is also essential to carry out awareness campaigns about the proper use of Internet access tools and the diffusion of social engineering techniques used by cybercriminals to distribute malware.<\/p>\n<h1 style=\"text-align: justify;line-height: 115%\"><strong>IOC<\/strong><\/h1>\n<p>&nbsp;<\/p>\n<p><strong>Hash MD5<\/strong><\/p>\n<p>E3636A8F7690363F1B20B43216DAEA79<\/p>\n<p>9DDB858C2C70BA20BF95E814138109EA<\/p>\n<p>DA23CC54F02481F7C09622AD858DC52D<\/p>\n<p>F53272F2C3249518A5F70B68920B0A26<\/p>\n<p>1B5003647BBAE52962136AE3CCE9B140<\/p>\n<p>F6602CF167A7A687A6510ACF347A5532<\/p>\n<p>7BF728A71F2D25095D843B4287354013<\/p>\n<p>C0BB58DBDCC80C28A924F18575970A08<\/p>\n<p>C8A606291C1C5F62AD3F176A9BA38C18<\/p>\n<p>4A274021641DE59F810A0D8EE8F1578D<\/p>\n<p>B2E1F08C53033C91B0F3589DF04E0870<\/p>\n<p>1B5003647BBAE52962136AE3CCE9B140<\/p>\n<p>F6602CF167A7A687A6510ACF347A5532<\/p>\n<p>BF8A90379BAFAA636EC90A6FEE2A239C<\/p>\n<p>CE8B31603C46B8C8F9057A48ED389352<\/p>\n<p>4F6F69970F7EE06CAE53518B4B567F17<\/p>\n<p>D6C309BDB7336543A618A5154166D4A6<\/p>\n<p>9456E2D1CEDC94BA2A11739F9406FD3B<\/p>\n<p>F281ADFB6FB12D79DEF69D9CDCB5A91B<\/p>\n<p>898DA26633A5E64E572F3717FAF43B9B<\/p>\n<p>FDFF1FA1935EF2929EC06B96AC9386D6<\/p>\n<p>15E32BF9C93F92BFCE1F00EF26C40D9F<\/p>\n<p>06B2BBBE49DE76D13306E5BAC693F7BB<\/p>\n<p>C0B2B350D09D3A789BD21887F3CC08D6<\/p>\n<p>B8F651AC504C739CA5B9285124A3ECBD<\/p>\n<p>CB2EE959AE1059C1E87DA7B3AB264C78<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Domains<\/strong><\/p>\n<p>HXXPS[:]\/\/FACTURACIONMEXICO[.]NET\/CHOCKA[.]PHP<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/UADMIN\/GATE[.]PHP<\/p>\n<p>HXXPS[:]\/\/FACTURACIONMEXICO[.]NET\/8VZ9D1-AD[.]JS<\/p>\n<p>FACTURAMX[.]CLUB\/8VZ9D1-AD[.]JS<\/p>\n<p>FACTURAMX[.]CLUB<\/p>\n<p>HXXPS[:]\/\/LLOYDMETALFAB[.]COM\/DESCARGAS\/FEB[.]PHP#[.]JSE<\/p>\n<p>HXXPS[:]\/\/WWW[.]KAWAITRAVELMEXICO[.]COM\/SAT[-]PORTAL[-]DESCARGAS[-]ACTUALIZACION[-]TRIBUTARIA<\/p>\n<p>HXXPS[:]\/\/FACTURACIONMEXICO[.]NET\/CHOA[.]PHP<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/W1Q5DXR7TE\/GATE[.]PHP<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/W1Q5DXR7TE\/GATE[.]PHP?PL=TOKEN&amp;LINK=BMX&amp;CALLBACK=JQUERY32007615543501712587_1659630759896&amp;DATA=%7B%22ONLINE_BIDER%22%3A1%2C%22W%22%3A0%2C%22DEV%22%3A3%7D&amp;_=1659630760036<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/W1Q5DXR7TE\/GATE[.]PHP?PL=TOKEN&amp;LINK=INTER&amp;CALLBACK=JSONP1659633991587&amp;_=1659634028100&amp;DATA=%7B%22ONLINE_BIDER%22%3A1%2C%22W%22%3A0%2C%22DEV%22%3A3%7D<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/BB\/BJIO[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/MONE\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/SAN\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/CDNJS[.]CLOUDFLARE[.]COM\/AJAX\/LIBS\/JQUERY\/3[.]2[.]0\/JQUERY[.]MIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/HNET\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/BMXE\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/INT\/B_INTER[.]JS<\/p>\n<p>HXXPS[:]\/\/CDNJS[.]CLOUDFLARE[.]COM\/AJAX\/LIBS\/JQUERY\/3[.]2[.]0\/JQUERY[.]MIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/HS\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/CDNJS[.]CLOUDFLARE[.]COM\/AJAX\/LIBS\/JQUERY\/3[.]2[.]0\/JQUERY[.]MIN[.]JS<\/p>\n<p>HXXPS[:]\/\/DLXFREIGHT[.]BID\/MX\/SANE\/MAIN[.]JS<\/p>\n<p>HXXPS[:]\/\/BBVA-COM-MX[.]8GEMIR[.]ASIA<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Filenames<\/strong><\/p>\n<p>SAT_POLICY2022.ZIP<\/p>\n<p>SAT_POLICY.JS<\/p>\n<p>._SAT_POLICY.JS<\/p>\n<p>SEGURO.JS<\/p>\n<p>MANIFEST.JSON<\/p>\n<p>SCREENSHOTFROM202034-58.PNG<\/p>\n<p>8VZ9D1-AD.JS<\/p>\n<p>FEB.HTA<\/p>\n<p>FEB.PHP#.JSE<\/p>\n<p>SCREENSHOTFROM202034-58.PNG<\/p>\n<p>SEGURO.JS<\/p>\n<p>MANIFEST.JSON<\/p>\n<p>8VZ9D1-AD.JS<\/p>\n<p>8VZ9D1.JS<\/p>\n<p>OK.JS<\/p>\n<p>MAIN.JS<\/p>\n<p>MAIN.JS<\/p>\n<p>B_INTER.JS<\/p>\n<p>MAIN.JS<\/p>\n<p>MAIN.JS<\/p>\n<p>BACKIMAGEN2022.JPG<\/p>\n<p>CONTIMAGEN2022.JPG<\/p>\n<p>JRIMAGEN2022.JPG<\/p>\n<p>MANIMAGEN2022.JPG<\/p>\n<p>SATDESCARGA.ZIP<\/p>\n<p>SAT.JS<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Filesystem Paths<\/strong><\/p>\n<p>%APPDATA%<\/p>\n<p>%LOCALAPPDATA%\/TEMP<\/p>\n<p>%LOCALAPPDATA%<\/p>\n<p>%SYSTEMDRIVE%\\USERS\\USERNAME\\APPDATA\\ROAMING\\MICROSOFT\\WINDOWS\\START MENU\\PROGRAMS\\STARTUP<\/p>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: justify;line-height: 115%\"><strong>Observables IOC<\/strong><\/h1>\n<p>&nbsp;<\/p>\n<p><strong>Hash MD5<\/strong><\/p>\n<p>C9DBCC2233B752055DE6ED75E56E0C30<\/p>\n<p>3ECDF2253E63541D570486575EF7CD66<\/p>\n<p>C8C6692A2BDC9D362F7370E63188927C<\/p>\n<p>3D82A8BF4275C8D0D62EC20839CF24EE<\/p>\n<p>1A7A6116EA1CA388903977FA48567D08<\/p>\n<p>9CFF860F447C0E88D5AB0E61344BF802<\/p>\n<p>817B2386BEBDEB905830547672990C66<\/p>\n<p>C9DBCC2233B752055DE6ED75E56E0C30<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Filenames<\/strong><\/p>\n<p>CHROME.LNK<\/p>\n<p>CHROME1.LNK<\/p>\n<p>TEAMVIEWER_SETUP_X64.EXE<\/p>\n<p>TV_X64.EXE<\/p>\n<p>TV_W32.EXE<\/p>\n<p>LNK1IMAGEN2021.JPG<\/p>\n<p>LNKIMAGEN2021.JPG<\/p>\n<p>LNK.JPG<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Between the last week of June and the third one of August, SCILabs identified a new malware campaign \u00a0which<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=293"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/293\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}