{"id":360,"date":"2022-12-15T01:22:27","date_gmt":"2022-12-15T01:22:27","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=360"},"modified":"2022-12-15T01:22:27","modified_gmt":"2022-12-15T01:22:27","slug":"new-threat-blackstink-man-in-the-browser-malware-campaign-targeting-mexico","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2022\/12\/15\/new-threat-blackstink-man-in-the-browser-malware-campaign-targeting-mexico\/","title":{"rendered":"New threat BlackStink: Man-in-the-Browser malware campaign targeting Mexico"},"content":{"rendered":"<h1><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-396 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/Logo-BlackStink.jpg\" alt=\"Logo BlackStink\" width=\"491\" height=\"242\" \/><\/h1>\n<h1>Overview<\/h1>\n<p>The following report provides the TTPs and IoCs of a new malware campaign that SCILabs named <strong><em>BlackStink<\/em><\/strong>. This campaign targets Mexico and was identified during the first week of November. The distribution method is through phishing emails under the pretext of supposed invoices and aims to perform Man-in-the-Browser attacks, misusing the <a href=\"https:\/\/support.google.com\/chrome\/a\/topic\/9025410?hl=en&amp;ref_topic=4386754\">Chrome Browser Cloud Management<\/a> panel to install malicious extensions, supplanting the legitimate <a href=\"https:\/\/chrome.google.com\/webstore\/detail\/google-docs-offline\/ghbmnnjooekpmoecnnnilnnbdlolhkhi\">Google Documents<\/a> extension.<\/p>\n<p>The main objective of this malware is to steal information from users of different financial institutions, through malicious extensions remotely installed in the Chrome browser.<\/p>\n<p>SCILabs performed a detailed analysis to determine if there is any relationship between this malware and other already known families, which share TTPs such as the use of HTA applications and malicious Google Chrome extensions to perform Man-in-the-Browser attacks, the malware analyzed and compared were <a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><em>BlackDog<\/em><\/a>, <a href=\"https:\/\/blog.talosintelligence.com\/2021\/12\/magnat-campaigns-use-malvertising-to.html\"><em>Magnant<\/em><\/a>, <a href=\"https:\/\/www.th3protocol.com\/2022\/ViperSoftX-Stealer#extensions\"><em>ViperSoftX<\/em><\/a> and <a href=\"https:\/\/decoded.avast.io\/janrubin\/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx\/\"><em>VenomSoftX<\/em><\/a>; however, there was no direct relationship with these threats, so due to its characteristics we named this malware as <strong><em>BlackStink<\/em><\/strong>.<\/p>\n<p>Finally, it is important to mention that the artifacts identified during the infection chain of this campaign are not found in the VirusTotal platform.<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h1><a name=\"_Toc80194999\"><\/a>How could it affect an organization?<\/h1>\n<p>The main objective of this campaign is to perform a Man-in-the-Browser attack to steal banking information from the victim. In addition, the attackers could install additional extensions with capabilities observed in other <a href=\"https:\/\/unaaldia.hispasec.com\/2020\/12\/detectadas-extensiones-maliciosas-para-chrome-y-microsoft-edge-con-mas-de-3-millones-de-instalaciones.html\">campaigns<\/a>, for example, monetize user traffic by redirecting it to external domains, redirecting to phishing or adware sites, among others. If an attack by this malware is successful, it potentially could cause economic and reputational losses to the organization, because the cybercriminals could misuse the information obtained by leaking it or selling it on underground forums or the black market.<\/p>\n<h1><a name=\"_Toc80195000\"><\/a>Analysis<\/h1>\n<h4>Threat context<\/h4>\n<p>During the first week of November, 3 emails were retrieved from our cyber-ecosystem, all of them indicating that a CFDI file and a key for the document were attached.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-361\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_1.png\" alt=\"Phishing email\" width=\"572\" height=\"351\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 1 \u2013 Phishing email<\/strong><\/p>\n<p>The attachment was a PDF file that attempted to persuade the user to download an additional file by displaying the message &#8220;<em>El archivo ha sido protegido con contrase\u00f1a y no puede ser mostrado. Vea el archivo en su PC.<\/em>&#8220;, when clicking on &#8220;<em>Descargar Documento<\/em>&#8221; it redirects to the URL <strong>hxxps[:\/\/]websylvania[.]com\/cfdi\/? e4e1fec0a9259fd2a07f4c6bc5577087e4e1fec0a9259fd2a07f4c6bc5577087e4e1fec0a9259fd2a07f4c6bc5577087<\/strong>, where the download of a RAR file starts.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-362\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_2.png\" alt=\"PDF attached in the email\" width=\"621\" height=\"306\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 2 \u2013 PDF attached in the email<\/strong><\/p>\n<p>The downloaded file was protected with a password, so at the moment of decompressing it, the password mentioned in the email and in the PDF file must be used, this password may change depending on the email. In the content of the compressed file there was a shortcut that aimed to execute a PowerShell script to start the malware infection chain.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-363\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_3.png\" alt=\"Shortcut properties \" width=\"374\" height=\"482\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 3 \u2013 Shortcut properties<\/strong><\/p>\n<p>The shortcut contains a PowerShell script with the following code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-364\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/code_1.png\" alt=\"Code Block\" width=\"1092\" height=\"135\" \/><\/p>\n<p>This line of code is responsible for starting a PowerShell instance to execute a remote file from the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/user[.]hta<\/strong>, abusing the Windows utility <a href=\"https:\/\/learn.microsoft.com\/en-us\/previous-versions\/\/ms536471(v=vs.85)?redirectedfrom=MSDN\">mshta.exe<\/a>, which is designed to run HTA-type applications.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-365\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/code_2.png\" alt=\"Code Block\" width=\"1086\" height=\"162\" \/><\/p>\n<p>This block of code gets the path where the shortcut was extracted, once the execution is finished, it deletes this file from the compromised device.<\/p>\n<p>The HTA file executed during the infection chain contains an obfuscated Visual Basic script, which is responsible for executing additional PowerShell commands.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-366\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_4.png\" alt=\"Obfuscated VBS code block in the user.hta file\" width=\"849\" height=\"110\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 4 \u2013 Obfuscated VBS code block in the user.hta file<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-367\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_5.png\" alt=\"Obfuscated PowerShell commands\" width=\"856\" height=\"380\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 5 \u2013 Obfuscated PowerShell commands<\/strong><\/p>\n<p>There are obfuscated strings in base64 in the PowerShell commands embedded in the code, once these strings are decoded, a PowerShell script is obtained. In general, the script is responsible for performing the following actions:<\/p>\n<ul>\n<li>It validates that the HTML file <strong>sat.com.mx<\/strong> exists in the %APPDATA% path, in case the file exists it uses the Invoke-Item module, which allows to open a file with the application associated with that type of file and terminates the execution, if it does not exist:\n<ul>\n<li>It downloads the code found on the SAT web page and saves it in a file called www.sat.com.mx.<\/li>\n<li>It validates that the file user.ps1 exists in the path %APPDATA%, if it does not exist, it downloads the file from the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/user[.]ps1<\/strong><strong>.<\/strong><\/li>\n<li>It executes PowerShell commands to bypass the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/identity-protection\/user-account-control\/how-user-account-control-works\">UAC<\/a> (User Account Control) utility, which prevents that even an administrator account can perform changes to the operating system, such as creating a new service or changing a registry key. To perform this bypass action, it creates a file called CMSTP.inf in the path %TEMP% with the configuration and commands needed to run the script user.ps1 with administrator privileges.<\/li>\n<li>Finally, it starts a PowerShell instance to execute the user.ps1 file using the configuration previously defined in CMSTP.inf.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-368\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_6.png\" alt=\"Deobfuscated PowerShell script\" width=\"821\" height=\"501\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 6 \u2013 Deobfuscated PowerShell script<\/strong><\/p>\n<p>The user.ps1 file performs the following actions:<\/p>\n<ul>\n<li>It downloads an SQLite module for PowerShell.<\/li>\n<li>It confirms the existence of the Chrome browser history, if it does not exist, it terminates the execution.<\/li>\n<li>It generates a file called Histo.db which contains all the information found in Chrome&#8217;s history.<\/li>\n<li>It validates the existence of the following URLs in history:\n<ul>\n<li>santander.com.mx<\/li>\n<li>sbi.com.mx\/invernet2000<\/li>\n<li>santander.com.mx<\/li>\n<li>bbvanetcash<\/li>\n<li>scotiabank.com.mx<\/li>\n<li>bbvanet.com.mx<\/li>\n<\/ul>\n<\/li>\n<li>If any of these URLs is found in the history, it makes a request using Invoke-Request to the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/it[.]php<\/strong>, passing as parameters the Get-UICulture ID and GET-WinSystemLocale, validating the local language settings on the infected machine and saves the response in a check.txt file in %APPDATA%.<\/li>\n<li>If the configuration corresponds to the Spanish language, the received response is executed using iex, which is an alias for Invoke-Expression. The purpose of the received code is to add the <strong>CloudManagementEnrollmentToken <\/strong>registry key in the path <strong>HKLM:\\SOFTWARE\\Policies\\Google\\Chrome\\.<\/strong> It is important to mention that if the registry path mentioned above does not exist on the computer, the malware execution fails.<\/li>\n<li>Finally, it deletes most of the files downloaded and generated during its execution.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-369\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_7.png\" alt=\"Block of code from the user.ps1 file\" width=\"934\" height=\"228\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 7 \u2013 Block of code from the user.ps1 file<\/strong><\/p>\n<p>If the registry key was successfully created, the victim&#8217;s Chrome browser is added to a Google cloud management console, which allows the console administrator to define the usage policies on the registered browsers, as well as the installation of extensions from the Chrome Web Store or from an external URL where the application is stored.<\/p>\n<p>The operators of this malware install two extensions on the compromised computer&#8217;s browser, which impersonate the Google Documents application. Both extensions cannot be removed or disabled by the user, on the details page of these applications one can see that the source is external to the Chrome Web Store and the permissions are \u201cRead and change all the data on the websites you visit\u201d.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-370\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_8.jpg\" alt=\"Malicious Chrome extensions\" width=\"513\" height=\"447\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 8 \u2013 Malicious Chrome extensions<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-371\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_9.png\" alt=\"Details of the malicious Chrome extension\" width=\"577\" height=\"575\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 9 \u2013 Details of the malicious Chrome extension<\/strong><\/p>\n<p>A static analysis of the extensions revealed the following URLs:<\/p>\n<ul>\n<li><strong>hxxps[:\/\/]update[.]pixelcdnjs[.]com\/extension\/manifiest[.]xml<\/strong> &#8211; URL defined as UPDATE_URL in the extension manifest.<\/li>\n<li><strong>hxxps[:\/\/]apesta[.]miculon[.]com\/static\/js\/collect\/pixel<\/strong> &#8211; URL found in the background.js file of the extension with ID bjpnnpifeliggnmlemieofjlgfgcpchb, the file is no longer available, so its purpose is unknown.<\/li>\n<li><strong>hxxps[:\/\/]pixel[.]gemsrail[.]com\/static\/js\/collect\/pixel<\/strong> &#8211; URL found in the background.js file of the extension with ID lbnjibnkojiiiikeagbpmldlbblanopo, the file is no longer available, so its purpose is unknown.<\/li>\n<\/ul>\n<p>When analyzing these domains, we found characteristics observed in malware campaigns, for example, all 3 domains have been recently registered and their certificates have been provided by Let&#8217;s Encrypt, which is an organization that provides free certificates. It is common to find certificates emitted by this organization on web pages used by cybercriminals to distribute malware.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-372\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_10.jpg\" alt=\"Domains found in the JS files of the malicious extensions\" width=\"439\" height=\"751\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 10 \u2013 Domains found in the JS files of the malicious extensions<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-373\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_11.png\" alt=\"Information of the domain gemsrail[.]com\" width=\"684\" height=\"475\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 11 \u2013 Information of the domain gemsrail[.]com<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-374\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_12.png\" alt=\"Certificates of the domain gemsrail[.]com\" width=\"544\" height=\"633\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 12 \u2013 Certificates of the domain gemsrail[.]com<\/strong><\/p>\n<p>When visiting a banking website found in the validation list of the malware and providing the login data, an object called &#8220;Check&#8221; is created, which contains the information submitted by the user. Additionally, a JavaScript object called &#8220;Result&#8221; of <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/Promise\">Promise<\/a> type can be observed, which has not been resolved and has a pending status, this may be due to some validation that did not get a valid response for the malware.<\/p>\n<p>At the time of writing this report, we have not observed additional malicious behavior from these extensions because the attacker&#8217;s infrastructure may not be available, so it is not possible to determine with certainty all the capabilities of the malware, however, based on our experience and research, SCILabs hypothesizes that once the victim submits access credentials on a banking website, these will be collected and shared with the C2 of the cybercriminals.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-375\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_13.jpg\" alt=\"JavaScript object Check in which the card number submitted can be observed\" width=\"696\" height=\"686\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 13 \u2013 JavaScript object Check in which the card number submitted can be observed<\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-376\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/img_14.png\" alt=\"JavaScript Result object with pending status\" width=\"860\" height=\"246\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 14 \u2013 JavaScript Result object with pending status<\/strong><\/p>\n<h1>Attack Flow<\/h1>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-377\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/Attack-Flow-BlackStink.png\" alt=\"Attack Flow BlackStink\" width=\"1047\" height=\"441\" \/><\/p>\n<p style=\"text-align: center\"><strong>Figure 15 \u2013 Attack flow<\/strong><\/p>\n<h1>Technical Summary<\/h1>\n<ul>\n<li>The campaign is distributed through phishing emails under the pretext of invoices, the email contains a PDF attachment which redirects to the download of a ZIP file protected with a password.<\/li>\n<li>The ZIP file contains a shortcut that has the objective of executing PowerShell commands to run an HTA application from the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/user[.]hta<\/strong> using the mshta.exe utility.<\/li>\n<li>The HTA application contains a block of obfuscated Visual Basic code, which is responsible for executing PowerShell commands embedded in the script.<\/li>\n<li>The embedded PowerShell commands contain strings obfuscated in base64, once these strings are decoded, a PowerShell script is obtained, which performs the following actions:\n<ul>\n<li>It validates the existence of the file www.sat.com.mx in the path %APPDATA%, if it exists, it is executed using the Invoke-Item module and ends with the execution of the script.<\/li>\n<li>If it does not exist, it downloads the code from the SAT web page and store it in the file www.sat.com.mx, validating the existence of the file user.ps1 in the path %APPDATA%, if it does not exist, it downloads from the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/user[.]ps1.<\/strong><\/li>\n<li>It executes a series of commands to bypass the UAC (User Account Control) utility and save the configuration in the CMSTP.inf file in the %TEMP% path.<\/li>\n<li>Finally, it starts a PowerShell instance to execute the file user.ps1 using the configuration previously defined in CMSTP.inf, which contains the configuration and commands necessary to execute the script with administrator privileges.<\/li>\n<\/ul>\n<\/li>\n<li>The user.ps1 file performs the following actions during its execution:\n<ul>\n<li>It downloads an SQLite module for PowerShell.<\/li>\n<li>It confirms the existence of the Chrome browser history, if it does not exist, terminates the execution.<\/li>\n<li>It generates a small database in a file called Histo.db which contains all the information found in Chrome&#8217;s history.<\/li>\n<li>It validates the existence of the following URLs in history:\n<ul>\n<li>santander.com.mx<\/li>\n<li>sbi.com.mx\/invernet2000<\/li>\n<li>santander.com.mx<\/li>\n<li>bbvanetcash<\/li>\n<li>scotiabank.com.mx<\/li>\n<li>bbvanet.com.mx<\/li>\n<\/ul>\n<\/li>\n<li>If any of these URLs is found, it performs an Invoke-Request to the URL <strong>hxxps[:\/\/]websylvania[.]com\/hydra\/it[.]php<\/strong> passing as parameters a couple of validations of the local configuration of the system, and the response is stored in the file check.txt in %APPDATA%.<\/li>\n<li>If the configuration corresponds to the Spanish language, the response is executed with Invoke-Expression. The objective of the received code is to add the <strong>CloudManagementEnrollmentToken <\/strong>registry key to the <strong>HKLM:\\SOFTWARE\\Policies\\Google\\Chrome\\ <\/strong><\/li>\n<li>Finally, it deletes most of the files downloaded and generated during its execution.<\/li>\n<\/ul>\n<\/li>\n<li>If the key was successfully created, the victim&#8217;s Chrome browser is added to a Google cloud management panel. After a while, two malicious extensions are installed remotely, which impersonate the Google Documents application.<\/li>\n<li>Once the victim visits a banking website of interest to the malware, two objects are created, the first one is called &#8220;Check&#8221;, with information entered by the user, and the second one is called &#8220;Result&#8221;, which is a Promise object waiting for validation or specific action.<\/li>\n<li>Finally, if the victim enters their access credentials on a banking website, these are collected and shared with the cybercriminals&#8217; C2.<\/li>\n<\/ul>\n<h1>Comparison between BlackStink&#8217;s campaign and other well-known campaigns<\/h1>\n<p>To determine if this threat is a new campaign, SCILabs team researched in public sources different campaigns that could be related to this campaign, finding similarities in some of them, such as:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><strong><em>BlackDog<\/em><\/strong><\/a><strong>:<\/strong> websites impersonating the Secretar\u00eda de Administraci\u00f3n Tributaria (SAT), use of HTA applications to start the infection chain. This threat aims to install a malicious Chrome extension to steal banking credentials, especially targeting Mexico.<\/li>\n<li><a href=\"https:\/\/blog.talosintelligence.com\/2021\/12\/magnat-campaigns-use-malvertising-to.html\"><strong><em>Magnant<\/em><\/strong><\/a><strong>:<\/strong> the use of EXE or ISO files for installation. This threat aims to install a backdoor using a malicious Chrome extension to steal banking credentials, especially targeting North America and Australia.<\/li>\n<li><a href=\"https:\/\/www.th3protocol.com\/2022\/ViperSoftX-Stealer#extensions\"><strong><em>VirusSoftX<\/em><\/strong><\/a>: execution through highly obfuscated JavaScript code. The threat creates persistence by creating a copy of the malicious code in the %APPDATA% path, the main goal of this campaign is to steal\/replace crypto wallets, in recent versions of the malware it uses Chrome extensions to inject malicious code.<\/li>\n<li><a href=\"https:\/\/decoded.avast.io\/janrubin\/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx\/\"><strong><em>VenomSoftX<\/em><\/strong><\/a><strong><em>: <\/em><\/strong>it is distributed via malicious Torrent files, commonly in cracked software archives. Installs a malicious Chrome extension that impersonates the Google Documents application, its main goal is to steal Cryptocurrency information on popular exchange sites.<\/li>\n<\/ul>\n<p>After this investigation, SCILabs team determined that despite the similarities, none of the analyzed campaigns used the same TTPs during their infection chain, so based on its characteristics, SCILabs named this malware as <strong><em>BlackStink<\/em><\/strong>.<\/p>\n<h1>TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/h1>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-378\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2022\/12\/table_1.png\" alt=\"TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework\" width=\"876\" height=\"621\" \/><\/p>\n<p style=\"text-align: center\"><strong>Table 1 &#8211; TTPs observed aligned to MITRE\u2019s ATT&amp;CK framework<\/strong><\/p>\n<h1>Assessment<\/h1>\n<p>During the investigation of this threat, SCILabs noticed that the main feature that differentiates it from other campaigns that use malicious Chrome extensions to perform Man-in-the-Browser attacks is the use of the Chrome Browser Cloud Management panel, a tool that allows them to have complete control over the registered browser. The remote installation of Google Chrome extensions, which cannot be disabled or uninstalled by the affected victim, is one of the aspects that make this threat especially dangerous, since the operators of this malware could install additional extensions, with capabilities observed in other malware that use Chrome extensions in their infection chain, for example, keylogging or adding the infected device to a Botnet, as is the case of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malicious-extension-lets-attackers-control-google-chrome-remotely\/\">Cloud9<\/a>.<\/p>\n<p>In addition, this attack could be very effective because most users of any type of organization do not usually have control of the Chrome browser and its installed extensions. Due to this and the effectiveness of the techniques used by this threat, SCILabs assures with a high level of confidence that we will continue to see similar campaigns throughout the rest of the year, as well as the evolution of its TTPs and infrastructure updates.<\/p>\n<p>Finally, SCILabs recommends taking the following actions:<\/p>\n<ul>\n<li>Check the registry keys for an unauthorized or suspicious <strong>CloudManagementEnrollmentToken <\/strong>configuration token in the path <strong>HKLM:\\SOFTWARE\\Policies\\Google\\Chrome\\<\/strong> to discard possible infections of this threat.<\/li>\n<li>Conduct a threat hunt for malicious add-ons or extensions in your company&#8217;s browsers that spoof legitimate extensions such as the Google Documents application.<\/li>\n<li>Have a strict policy regarding the use and installation of add-ons or extensions, especially in Google Chrome.<\/li>\n<li>Look for suspicious files with names like <strong>sat.com.mx<\/strong>, <strong>user.ps1<\/strong> or <strong>check.txt<\/strong> in %APPDATA% to rule out possible infection by this threat.<\/li>\n<li>Look for suspicious SQLite database and configuration files with names like CMSTP.inf or Histo.db in %TEMP% to discard possible infections of this threat.<\/li>\n<li>Conduct awareness campaigns on the proper use of Internet access tools and the diffusion of social engineering techniques used by cybercriminals to distribute malware.<\/li>\n<li>Add the indicators of compromise reflected in this research to your security solutions.<\/li>\n<\/ul>\n<h1 style=\"text-align: justify;line-height: 115%\"><strong>IOC<\/strong><\/h1>\n<p><strong>Hash MD5 <\/strong><\/p>\n<p>1B11BA3ECEEE4E9F4579A45DA95F11AD<\/p>\n<p>1719A49709FD453A1B2934E3E4EAFC26<\/p>\n<p>26DD848E6E7EAEE8971FCCD4E6C9B332<\/p>\n<p>2F483280491A0FCF27194322F22FAF7B<\/p>\n<p>6E40E3CEAA3B8FDBD1ECF93F930FE4CA<\/p>\n<p>842D09A2BF09D43F75D8AB498D1C3DB4<\/p>\n<p>B11354D793B996A038D548BC6B0E4D4A<\/p>\n<p>8F1546582A0CF7A3B08881D6C3C18EC0<\/p>\n<p>7423E4B568EBB415FF916D5CB99AC9C0<\/p>\n<p>DD18F251324C25C7D712DC0FE0424C6E<\/p>\n<p>F5738B01C9110A68DA58A00C558B2528<\/p>\n<p>71F2513CA9AB2631B5F9B4B571AA3E13<\/p>\n<p>E8737AFBABDCA29481E4AF8071389602<\/p>\n<p>31F65612BB67F7A11E1D77094DC38A26<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Extensions ID<\/strong><\/p>\n<p>BJPNNPIFELIGGNMLEMIEOFJLGFGCPCHB<\/p>\n<p>LBNJIBNKOJIIIIKEAGBPMLDLBBLANOPO<\/p>\n<p>&nbsp;<\/p>\n<p><strong>File Names<\/strong><\/p>\n<p>ENVIO_CFDI_28449.PDF<\/p>\n<p>CFDI_956623.RAR<\/p>\n<p>CFDI_SAT.GOB.MX<\/p>\n<p>15747.HTA<\/p>\n<p>USER.HTA<\/p>\n<p>74B6.PS1<\/p>\n<p>USER.PS1<\/p>\n<p>CMSTP.INF<\/p>\n<p>CHECK.TXT<\/p>\n<p>BACKGROUND.JS<\/p>\n<p>BACKGROUND.JS.LICENSE.TXT<\/p>\n<p>INDEX.JS.LICENSE.TXT<\/p>\n<p>INDEX.HTML<\/p>\n<p>INDEX.JS<\/p>\n<p>MANIFEST.JSON<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Domains<\/strong><\/p>\n<p>WEBSYLVANIA[.]COM<\/p>\n<p>UPDATE[.]PIXELCDNJS[.]COM<\/p>\n<p>APESTA[.]MICULON[.]COM<\/p>\n<p>PIXEL[.]GEMSRAIL[.]COM<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Malware URLs<\/strong><\/p>\n<p>HXXPS[:\/\/]KH7JV[.]STORE\/?KJN4HG8JBSLHORPICHKJNUEQBWNOCARXMGPJORBUXZKB1JTZMC0HLRWBYAEGGFKJN4HG8JBSLHORPICHKJNUEQBWNOCARXMGPJORBUXZKB1JTZMC0HLRWBYAEGGF<\/p>\n<p>HXXPS[:\/\/]WEBSYLVANIA[.]COM\/CFDI\/?E4E1FEC0A9259FD2A07F4C6BC5577087E4E1FEC0A9259FD2A07F4C6BC5577087E4E1FEC0A9259FD2A07F4C6BC5577087<\/p>\n<p>HXXPS[:\/\/]WEBSYLVANIA[.]COM\/HYDRA\/USER[.]HTA<\/p>\n<p>HXXPS[:\/\/]WEBSYLVANIA[.]COM\/HYDRA\/USER[.]PS1<\/p>\n<p>HXXPS[:\/\/]WEBSYLVANIA[.]COM\/HYDRA\/IT[.]PHP<\/p>\n<p>HXXPS[:\/\/]UPDATE[.]PIXELCDNJS[.]COM\/EXTENSION\/MANIFIEST[.]XML<\/p>\n<p>HXXPS[:\/\/]APESTA[.]MICULON[.]COM\/STATIC\/JS\/COLLECT\/PIXEL<\/p>\n<p>HXXPS[:\/\/]PIXEL[.]GEMSRAIL[.]COM\/STATIC\/JS\/COLLECT\/PIXEL<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The following report provides the TTPs and IoCs of a new malware campaign that SCILabs named BlackStink. This campaign<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}