{"id":460,"date":"2023-10-08T05:48:45","date_gmt":"2023-10-08T05:48:45","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=460"},"modified":"2023-10-08T05:48:45","modified_gmt":"2023-10-08T05:48:45","slug":"ursa-mispadu-overlap-analysis-with-other-threats","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2023\/10\/08\/ursa-mispadu-overlap-analysis-with-other-threats\/","title":{"rendered":"URSA\/Mispadu: Overlap analysis with other threats"},"content":{"rendered":"<h1>Overview<\/h1>\n<p>In the current threat landscape in Latin America, the <a href=\"https:\/\/blog.scilabs.mx\/en\/cyber-threat-profile-malteiro\/\"><em>Malteiro<\/em><\/a> cybercriminal group (operators of the <em>URSA\/Mispadu<\/em> banking trojan) has become one of the threat actors with the most significant presence in the region and of great relevance due to its constant evolution in its infection chain.<\/p>\n<p>Since February 2023, several public investigations have provided information on other threats named in some external investigations, such as <a href=\"https:\/\/servicioscms.bolsadesantiago.com\/Corporativo\/Documentos%20Noticias\/Noticias%20Corporativas\/Marketing%202023\/ILNKER%20y%20Porongona%20Bolsa%20(1).pdf\"><em>Porongona<\/em><\/a>, <a href=\"https:\/\/www.metabaseq.com\/fenix-botnet\/\"><em>Botnet Fenix<\/em><\/a>, and <a href=\"https:\/\/perception-point.io\/blog\/manipulated-caiman-the-sophisticated-snare-of-mexicos-banking-predators-technical-edition\/\"><em>Manipulated Caiman<\/em><\/a>, apparently new in-the-wild. However, after a meticulous analysis carried out by SCILabs, various overlaps were identified between the TTPs (Tactics, Techniques, and Procedures) of these recently revealed threats and the already known banking trojan <em>URSA\/Mispadu<\/em>. As was published in May 2023 in the post &#8220;<a href=\"https:\/\/blog.scilabs.mx\/en\/evolution-of-banking-trojan-ursa-mispadu\/\"><em>Evolution of the URSA\/Mispadu banking Trojan<\/em><\/a>&#8221; it is a threat that implements constant changes in its infection chain.<\/p>\n<p>In this publication, SCILabs shows an exhaustive analysis of the overlaps in the TTPs, which has allowed us to assert, with a medium level of confidence, that the <em>Porongona<\/em>, <em>Botnet Fenix<\/em>, and <em>Manipulated Caiman<\/em> threats are essentially part of the operation of the <em>Malteiro<\/em> threat group. Its objective is the theft of confidential information, especially banking data, belonging to users of various financial institutions in Latin America; and its distribution method is the use of phishing emails under pretexts such as pending invoices or tax matters.<\/p>\n<p>Finally, in a region as interconnected as Latin America, where financial institutions are vital for economic stability, understanding the nature and origin of malware is crucial for a proactive response to the various threats that affect the region.<\/p>\n<h1>How could banking trojans affect an organization?<\/h1>\n<p>If an attack from any of these threats or those with similar capabilities is successful within an organization, it could result in substantial financial losses for both the organization and its users, affecting the trust of financial institutions and negatively impacting the industry. Additionally, leaking victims&#8217; confidential information on Dark Web forums and the black market could lead to legal issues and exposure of sensitive personal data, which could cause reputational damage to organizations.<\/p>\n<h1>Analysis<\/h1>\n<h1><em>Context of the Porongona, Manipulated Caiman, and Botnet Fenix Threats<\/em><\/h1>\n<p>Since early February 2023, some cybersecurity firms have investigated apparent new threats in LATAM, which were made known in various public sources, with names such as <em><a href=\"https:\/\/cl.linkedin.com\/posts\/bolsadesantiago_cuidado-nuevo-malware-anda-suelto-activity-7034912533165535232-eA0b\">Porongona<\/a><\/em>, <em><a href=\"https:\/\/securetag.com.mx\/noticias\/botnet-fenix-nueva-botnet-dirigida-a-los-contribuyentes-en-mexico-y-chile\/\">Botnet Fenix<\/a><\/em>, and <em><a href=\"https:\/\/perception-point.io\/blog\/manipulated-caiman-the-sophisticated-snare-of-mexicos-banking-predators-technical-edition\/\">Manipulated Caiman<\/a><\/em>. For this reason, SCILabs has followed up on these threats and analyzed their TTPs, which resulted in these campaigns being related to <em>the URSA\/Mispadu<\/em> banking trojan and the operation of the <em>Malteiro<\/em> threat group.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-480\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA1-1.jpg\" alt=\"\" width=\"1067\" height=\"600\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>1<\/strong><strong> \u2013 Posts from public sources related to emerging threats<\/strong><\/p>\n<p>Some of the characteristics why SCILabs considers that other security firms classified these threats as new malware families or campaigns is that they make use of different types of droppers such as BAT, LNK, URL, and JSE files, along with the &#8220;file:\\\\&#8221; protocol during the infection chain, which was not expected to see in known threats such as <em>URSA\/Mispadu<\/em>. Generally, this malware used droppers developed in Visual Basic Script and artifacts such as deploying a Botnet, an SMTP Bot, and an AutoIt script that functions as a stealer.<\/p>\n<p><strong><em>Porongona<\/em><\/strong><\/p>\n<p><em>Porongona<\/em> is malware identified in <a href=\"https:\/\/servicioscms.bolsadesantiago.com\/Corporativo\/Documentos%20Noticias\/Noticias%20Corporativas\/Marketing%202023\/ILNKER%20y%20Porongona%20Bolsa%20(1).pdf\">public sources<\/a> as an emerging threat in February 2023. However, SCILabs identified overlaps in its TTPs with the <em>URSA\/Mispadu<\/em> trojan.<\/p>\n<p>The following figure shows the comparison of two BAT-type droppers: on the left side, the code identified in public investigations of <em>Porongona<\/em> at the beginning of 2023 is observed; on the right side, one of the <em>URSA\/Mispadu<\/em> dropper identified by SCILabs in mid-2022.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-481\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA2-1.jpg\" alt=\"\" width=\"1206\" height=\"318\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>2<\/strong><strong> &#8211; <em>URSA\/Mispadu <\/em>Droppers<\/strong><\/p>\n<p>As the images show, both source codes are similar, with slight differences, like the name of variables and the name of the payloads installed on the infected computer. However, the objective is the same: install and run a dropper developed with AutoIt that seeks to steal credentials from the Outlook email client and information from the Google Chrome browser, such as browsing history and the credentials stored in it, to install the <em>URSA\/Mispadu<\/em> Trojan later, as was documented in research on the evolution of this threat published on the <a href=\"https:\/\/blog.scilabs.mx\/en\/evolution-of-banking-trojan-ursa-mispadu\/\">SCILabs blog<\/a>.<\/p>\n<p>The following image compares the source code of the AutoIt scripts related to the <em>Porongona<\/em> threat and the <em>URSA\/Mispadu<\/em> trojan, which SCILabs analyzed. The following points can be observed:<\/p>\n<ol>\n<li>Identical function names and comments.<\/li>\n<li>The rest source code is identical.<\/li>\n<li>A slight variation in the <em>URSA\/Mispadu<\/em> script analyzed by SCILabs aims to delete some temporary files used to deploy the trojan. Updates to the source code of the same threat over time is expected.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-482\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA3-1.jpg\" alt=\"\" width=\"1417\" height=\"443\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>3<\/strong><strong> &#8211; Above, <em>Porongona&#8217;s<\/em> AutoIt code; below, <em>URSA\/Mispadu <\/em>AutoIt code<\/strong><\/p>\n<p>SCILabs has identified variations in the <em>URSA\/Mispadu<\/em> infection chain using BAT-type droppers <a href=\"https:\/\/blog.scilabs.mx\/en\/evolution-of-banking-trojan-ursa-mispadu\/\">and AutoIt script variants<\/a>. Sometimes, in addition to acting as a stealer, the AutoIt script (before the infection with <em>URSA\/Mispadu<\/em>) installs a backdoor with a .xls extension, which is executed as an <a href=\"https:\/\/devblogs.microsoft.com\/scripting\/using-net-framework-assemblies-in-windows-powershell\/\">Assembly<\/a>, that is, using the <a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/malware\/fileless-malware\/\">Fileless technique<\/a> using PowerShell: This same technique was also documented in <em>Porongona&#8217;s<\/em> external research to search and access SMTP servers with known users and weak passwords, both developed in C# .NET. This functionality was also documented in the <em>Manipulated Caiman <\/em>public investigation, which SCILabs describes below.<\/p>\n<p><strong><em>Botnet Fenix<\/em><\/strong><\/p>\n<p><em>Botnet Fenix<\/em> is a threat identified in public <a href=\"https:\/\/www.metabaseq.com\/fenix-botnet\/\">investigations<\/a> as an emerging Botnet, active since the end of 2022. The publications of this threat began to make the media in May 2023, so SCILabs carried out an investigation on the overlap with the <em>URSA\/Mispadu<\/em> operation and the <a href=\"https:\/\/blog.scilabs.mx\/en\/cyber-threat-profile-red-winterdog\/\"><em>Red WinterDog<\/em><\/a> threat group.<\/p>\n<p>Figure 4 illustrates the appearance of a <em>Botnet Fenix<\/em> dropper published in open sources. This type of dropper is also used by <em>Red WinterDog<\/em> to distribute the <a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><em>BlackDog<\/em><\/a> trojan and was identified by SCILabs in early 2023.<\/p>\n<p>Perception Point also reported this type of artifact in the <a href=\"https:\/\/perception-point.io\/blog\/manipulated-caiman-the-sophisticated-snare-of-mexicos-banking-predators-technical-edition\/\">public investigation<\/a> of the <em>Manipulated Caiman <\/em>threat. SCILabs identified multiple overlaps with the <em>URSA\/Mispadu<\/em> trojan, which are mentioned below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-483\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA4.jpg\" alt=\"\" width=\"912\" height=\"219\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>4<\/strong><strong> &#8211; <\/strong><a href=\"https:\/\/www.metabaseq.com\/fenix-botnet\/\"><strong><em>Botnet Fenix<\/em><\/strong><strong> dropper (The image was shown at the Fenix botnet public investigation)<\/strong><\/a><\/p>\n<p>During constant monitoring, SCILabs identified the <a href=\"https:\/\/blog.scilabs.mx\/en\/evolution-of-banking-trojan-ursa-mispadu\/\"><em>URSA\/Mispadu<\/em><\/a> trojan and the use of JSE-type files as droppers. This point is critical because some cybersecurity companies published JSE and LNK-type droppers in their investigations, which aim to download and execute a PowerShell script from a URL almost identical to the <a href=\"https:\/\/www.biztalk360.com\/blog\/web-endpoint-monitoring-biztalk360\/\">Endpoint Web<\/a> structure \u201c<strong>execution.php?tag=[russian|tribu]<\/strong>\u201d.<\/p>\n<p>In the case of the most observed <em>URSA\/Mispadu<\/em> campaigns, SCILabs identified that downloading the PowerShell script mentioned above is done via one of its droppers with an AutoIt script.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-466 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/figura5.jpg\" alt=\"\" width=\"959\" height=\"322\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>5<\/strong><strong> &#8211; <em>Porongona <\/em>dropper<\/strong><\/p>\n<p>The mentioned script has the objective of installing a <a href=\"https:\/\/www.metabaseq.com\/fenix-botnet\/\">Botnet<\/a> and a Backdoor. SCILabs observed, since September 2022, <em>URSA\/Mispadu<\/em> campaigns downloading an additional artifact (.xls extension) with Backdoor capabilities, which is executed as an Assembly using PowerShell, in addition to an artifact used to gain access to SMTP servers with weak credentials; this same artifact is mentioned in the Perception Point research.<\/p>\n<p>Additionally, the investigation by &#8220;Bolsa de Santiago&#8221; mentions that they observed different versions of the <em>Porongona<\/em> malware, using, for example, VBS files as a dropper, as <em>URSA\/Mispadu<\/em> commonly does.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-484\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA6.jpg\" alt=\"\" width=\"1088\" height=\"314\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>6<\/strong><strong> \u2013 PowerShell script<\/strong><\/p>\n<p>It is important to highlight that there are overlaps between the infrastructure reported in the <em>Botnet Fenix<\/em> investigation and the <em>URSA\/Mispadu<\/em> campaigns tracked by SCILabs, such as the use of \u201c.top\u201d domains and words like \u201crussian.\u201d, \u201cbra[other text]\u201d, as well as the Web EndPoint structure <strong>\u201c\/bra[other text]\/post.php<\/strong>\u201d (the prefix \u201cbra\u201d could be associated with the country of origin of the <em>URSA\/Mispadu<\/em> malware, Brazil).<\/p>\n<p>As an example, in the <a href=\"https:\/\/www.metabaseq.com\/fenix-botnet\/\">Fenix Botnet research<\/a>, the URL <strong>HXXPS[:]\/\/RUSSIANCL[.]TOP\/BRAMX\/POST[.]PHP<\/strong> is mentioned. Additionally, in November 2022, SCILabs identified the URL <strong>HXXPS[:]\/\/RUSSIANMEN75[.]TOP\/BRAZOOKA\/POST[.]PHP<\/strong> as part of the infrastructure used in the <em>URSA\/Mispadu<\/em> campaign.<\/p>\n<p><strong><em>Manipulated Caiman<\/em><\/strong><\/p>\n<p><em>Manipulated Caiman<\/em> is the name Perception Point assigned to the threat actor it identified in early August. Its primary goal is to distribute the <em>URSA\/Mispadu<\/em> banking trojan and install additional malware, such as an SMTP Bot and SPAM client.<\/p>\n<p>As mentioned, SCILabs has constantly monitored the <em>URSA\/Mispadu<\/em> banking trojan campaigns, so its constant and gradual evolution has been observed. In September 2022, the infection chain mentioned by Perception Point was identified by SCILabs, including the use of an additional dropper with stealing capabilities and installing malware, for example, the SMTP Bot.<\/p>\n<p>Although there are slight differences between the infection chain mentioned by Perception Point and those commonly analyzed by SCILabs, such as the use of a URL-type dropper and payloads named as supposed JPG-type images, it is common for these types of changes to occur in most of the banking Trojans that affect the region and that even replicate themselves in other threats, as we have observed with <em>Grandoreiro<\/em> and <em>Red WinterDog<\/em>. Everything indicates that this is another campaign, related to the operation of the <a href=\"https:\/\/blog.scilabs.mx\/cyber-threat-profile-malteiro\/\"><em>Malteiro<\/em><\/a> threat group, profiled by SCILabs in 2021.<\/p>\n<p>Below, we present some of the most significant overlaps between <em>Manipulated Caiman<\/em> and <em>URSA\/Mispadu<\/em> identified by SCILabs that allowed us to formulate the hypothesis that it is a <em>Malteiro<\/em> campaign.<\/p>\n<p>In its investigation, Perception Point mentioned that it observed the payloads of an AutoIt executable, and a script (also an AutoIt dropper) encoded in two base64 certificates. <em>Malteiro<\/em> implemented this technique to distribute the <em>URSA\/Mispadu<\/em> trojan since at least September 2022.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-485\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/FIGURA7.jpg\" alt=\"\" width=\"1335\" height=\"182\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>7<\/strong><strong> &#8211; On the left, the payload identified by Perception Point; on the right, the payload reported by SCILabs in 2022<\/strong><\/p>\n<p>In the <em>Manipulated Caiman<\/em> investigation, a dropper and URLs with identical Endpoints are observed as have been seen by SCILabs in <em>Malteiro<\/em> campaigns since 2022; said dropper has stealer capabilities and the objective of installing additional artifacts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-469 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/figura8.jpg\" alt=\"\" width=\"1124\" height=\"69\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>8<\/strong><strong> &#8211; On the left, a code fragment analyzed by Perception Point; on the right, code analyzed by SCILabs<\/strong><\/p>\n<p>One of the droppers, analyzed in the investigation by Perception Point, contains multiple validations identical to those reported by SCILabs since it began monitoring the <em>URSA\/Mispadu<\/em> trojan in 2021. The profiling of the <em>Malteiro<\/em> threat group, the verification of virtualized environments, the languages of the operating system, the verification of the computer name \u201c<strong>JOHN-PC<\/strong>,\u201d and even the order of these verifications are identical to those always observed in the <em>URSA\/Mispadu<\/em> campaigns.<\/p>\n<p>Although in this campaign, an artifact developed with Visual Basic was used as a dropper, and in other campaigns, the same dropper developed with Visual Basic Script was observed, this is typical in <em>Malteiro<\/em> campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-470\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/figura9.jpg\" alt=\"\" width=\"686\" height=\"422\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>9<\/strong><strong> &#8211; Fragment of Perception Point research<\/strong><\/p>\n<p>The <em>Manipulated Caiman<\/em> investigation mentions the device used to gain access to SMTP servers through weak usernames and passwords. SCILabs observed 2021 the same artifact in using the same users and passwords, even in the same order.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-471 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/figura10.jpg\" alt=\"\" width=\"913\" height=\"409\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure <\/strong><strong>10<\/strong><strong> &#8211; On the left side, the artifact reported by Perception Point; on the right side, the artifact analyzed by SCILabs.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Although the points mentioned above are the most notable, they are not the only ones; SCILabs, for its part, identified overlaps even in the infrastructure documented in the <em>Manipulated Caiman<\/em> investigation, such as using the <strong>russk22[.]icu<\/strong> domain.<\/p>\n<p>It is worth mentioning that Perception Point said, in its investigation, that it observed that the threat actor named by them as <em>Manipulated Caiman<\/em> installed malicious extensions in the Chrome or Edge browsers, just as the <em>Red WinterDog<\/em> threat actor does. However, in the published research, SCILabs did not observe conclusive evidence about this statement, so it is hypothesized that the identification in public investigations of URL, JSE, and LNK type droppers and the \u201c<strong>file:\\\\<\/strong>\u201d protocol commonly observed in <em>Red WinterDog<\/em> campaigns distributing malicious extensions, as well as the use of droppers developed with .NET, may have caused forks in campaign attribution. This hypothesis has a medium level of confidence because it is necessary to continue observing the evolution of this threat in the coming months.<\/p>\n<p><strong>Overlapping with other threats<\/strong><\/p>\n<p>Through permanent threat monitoring in the LATAM region, SCILabs has constantly observed some overlaps in campaigns of various malware families such as <em>URSA<\/em>\/<em>Mispadu<\/em>, <em>Grandoreiro<\/em>, <em>Mekotio<\/em>, and <a href=\"https:\/\/blog.scilabs.mx\/en\/new-blackdog-malware-man-in-the-browser-malware-campaign-targeting-mexico\/\"><em>BlackDog<\/em><\/a>, like the use of URL, LNK type droppers, executables pretending to be CAPTCHA validators, and also in infrastructure with the use of the domains <strong>russk21[.]icu<\/strong>, <strong>miningrus1[.]click<\/strong>, <strong>miningrus1[.]site<\/strong> and <strong>moscow77[.]online<\/strong> or similar. These domains have been observed in telemetry in different malware campaigns, such as <a href=\"https:\/\/blog.scilabs.mx\/threat-analysis-catasia\/\"><em>Catasia<\/em><\/a>, <a href=\"https:\/\/blog.talosintelligence.com\/neurevt-trojan-takes-aim-at-mexican\/\"><em>Neurevt<\/em><\/a>, <a href=\"https:\/\/blog.scilabs.mx\/en\/blackparty-trojan\/\"><em>BlackParty<\/em><\/a>, and <a href=\"https:\/\/cyble.com\/blog\/the-rise-of-amadey-bot-a-growing-concern-for-internet-security\/\"><em>Amadey<\/em><\/a>, suggesting the rental, purchase, and infrastructure sharing between threat actors and malware operators.<\/p>\n<p>SCILabs considers that the above may be part of the constant effort of adversaries to evolve their techniques to increase the effectiveness rate of their attacks and optimize resources. This could even imply collaboration between various threat actors. However, SCILabs must continue researching the modus operandi of the different malware families to conclude with high confidence.<\/p>\n<p><strong>Context conclusion<\/strong><\/p>\n<p>The introduction of <em>Botnet Fenix<\/em>, <em>Manipulated Caiman<\/em>, and <em>Porongona<\/em> since February 2023 in the LATAM threat landscape and their analysis reveals that the apparent differences are masking a deeper connection with the <em>Malteiro<\/em> operation and the <em>URSA\/Mispadu<\/em> trojan. This contextualization reinforces the notion that the observed variations could be evolutionary strategies of the same adversary. In the next section, we present the analysis of the overlaps between <em>URSA\/Mispadu<\/em> and the threats mentioned above.<\/p>\n<p><strong>Analysis of URSA\/Mispadu overlaps with other threats.<\/strong><\/p>\n<p>The following TTP analysis is one of the pillars on which SCILabs relied to determine with a medium level of confidence that <em>Manipulated Caiman<\/em>, <em>Botnet Fenix<\/em>, and <em>Porongona<\/em> are different manifestations of the <em>Malteiro<\/em> operation and the <em>URSA\/Mispadu<\/em> banking trojan. The overlaps observed between the multiple investigations of these threats were considered in the following table.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-491\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/tableen.jpg\" alt=\"\" width=\"797\" height=\"811\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Table 1 &#8211; Overlaps between <em>URSA\/Mispadu<\/em>, <em>Manipulated Caiman<\/em>, <em>Porongona<\/em> and <em>Botnet Fenix<\/em><\/strong><\/p>\n<p>Finally, SCILabs determined that there are between 9 and 16 overlaps in the threats described in this report, with <em>Manipulated Caiman<\/em> being the one that shows the most coincidences with a total of 16, <em>Porongona<\/em> with a total of 14, and <em>Botnet Fenix<\/em> with a total of 9 coincidences. The fact that there are so many overlaps between these threats means that it is highly probable that they are just different manifestations of <em>URSA\/Mispadu<\/em> since, although they have different behaviors in some parts of their attack flow, it is difficult for other banking trojans to share so many overlaps.<\/p>\n<h1>Attack flow summary<\/h1>\n<p>Below is a diagram of the general operation of the threats described in this document, pointing out the overlaps between the infection chains of the threats mentioned.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-490\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/diagramen.jpg\" alt=\"\" width=\"1498\" height=\"794\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 11 \u2013 Attack Flow<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>In the previous Figure, different boxes listed in other parts of the flow of the diagram can be observed. To do this, SCILabs has made hypotheses for each of them about the reason(s) why different investigations considered it a new threat.<\/p>\n<p><strong>1. Start of the infection chain<\/strong><\/p>\n<p style=\"text-align: left;\">SCILabs observed that the start of the infection chain of <em>Manipulated<\/em> <em>Caiman<\/em> and <em>Botnet Fenix<\/em> is similar, and as well, the attack flow used by <em>Red WinterDog<\/em> in the <em>BlackDog<\/em> variant documented in May of this year.<\/p>\n<p style=\"text-align: left;\">Medium level of confidence: Different threat groups and malware operators have likely started using some framework to distribute and operate malware acquired under the Malware-as-a-Service business model.<\/p>\n<p style=\"text-align: left;\">Low level of confidence: <em>Red WinterDog<\/em> is related in some way to <em>Malteiro<\/em>, acquiring malware developed by the latter to increase its reach and revenue.<\/p>\n<p><strong><em>2. Manipulated Caiman<\/em><\/strong><strong>:<\/strong><\/p>\n<p>SCILabs hypothesizes, with medium confidence, that the manufacturer that conducted the external investigation that determined <em>Manipulated Caiman<\/em> to be a new threat actor may have taken into account only the most significant variations in the chain of infection, such as the beginning of the chain, the modification of the droppers and the implementation of an Outlook credential stealer and a bot to obtain access to SMTP servers; however, this activity was identified by SCILabs in September 2022.<\/p>\n<p><strong><em>3. Botnet Fenix<\/em><\/strong><strong>: <\/strong><\/p>\n<p>SCILabs hypothesizes, with a medium confidence, that it is possible that the manufacturer who determined that <em>Botnet Fenix<\/em> was a new threat only considered that the beginning of the infection chain is different from that usually documented by most security companies; however, this behavior was observed and reported by SCILabs in <em>URSA\/Mispadu<\/em> investigations.<\/p>\n<p><strong><em>4. Porongona<\/em><\/strong><strong>:<\/strong><\/p>\n<p>SCILabs hypothesizes, with medium confidence, that the manufacturer who determined <em>Porongona<\/em> to be a new threat may have only considered using two atypical new droppers in a <em>URSA\/Mispadu<\/em> infection, on one hand, the use of batch files and, and on the other hand, the implementation of files with an XLS extension to inject an email credentials stealer. However, when analyzing the report, SCILabs observed that this behavior has been reported on different occasions and attributed to <em>URSA\/Mispadu<\/em>.<\/p>\n<p>Finally, after analyzing each threat and its attack flows, it was possible to observe that they even if share different TTPs, by joining the <em>Porongona<\/em> and <em>Botnet Fenix<\/em> diagrams, it is possible to obtain an almost identical attack flow to that of <em>Manipulated Caiman<\/em>, which strengthens the hypotheses formulated in the <strong>Context Conclusion<\/strong> section.<\/p>\n<p><strong>Observed TTPs aligned to the MITER ATT&amp;CK\u00ae framework shared by\u00a0 <em>URSA\/Mispadu<\/em>, <em>Manipulated Caiman<\/em>, <em>Porongona<\/em> and <em>Botnet Fenix<\/em><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-487\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/MITRE.jpg\" alt=\"\" width=\"1040\" height=\"595\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Table 2 &#8211; MITRE ATT&amp;CK\u00ae matrix<\/strong><\/p>\n<p><strong>Diamond Model of <em>Malteiro<\/em> and the <em>URSA\/Mispadu <\/em>operators<\/strong><\/p>\n<p>Below is the general diamond model for the threats described in this report, considering the hypotheses that these are part of <em>Malteiro&#8217;s<\/em> operation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-488 aligncenter\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2023\/10\/DIAMOND.jpg\" alt=\"\" width=\"1307\" height=\"783\" \/><\/p>\n<p style=\"text-align: center;\"><strong>Figure 13 \u2013 Diamond Model<\/strong><\/p>\n<h1>Conclusion<\/h1>\n<p>Clarifying the Latin American threat landscape can help organizations improve their security posture, accurately knowing malware operators&#8217; TTPs and modus operandi.<\/p>\n<p>With the evidence obtained during the investigation, SCILabs issued a medium confidence xxxx that the threats mentioned above are part of the <em>Malteiro<\/em> threat group&#8217;s operating model based on the following two hypotheses:<\/p>\n<ol>\n<li>These are different iterations of the same malicious actor, <em>Malteiro<\/em>, who orchestrates various campaigns to steal banking information through <em>URSA\/Mispadu<\/em> and other techniques, such as the theft of browser credentials.<\/li>\n<li><em>URSA\/Mispadu<\/em> operates under the Malware-as-a-Service model so that these threats may be part of the <em>Malteiro<\/em> infrastructure, but other threat actors carry out the campaigns.<\/li>\n<\/ol>\n<p>Likewise, SCILabs will continue to follow up on the threats in this research to obtain evidence that helps increase confidence in the hypotheses generated by SCILabs.<\/p>\n<h1>Recommendations<\/h1>\n<ol>\n<li>Block the indicators of compromise present in this report.<\/li>\n<li>If possible, block or alert the use of AutoIt in all the EndPoints of the organization.<\/li>\n<li>Avoid using weak passwords and disabling access to users who no longer use the organization\u2019s platforms and systems. Next, we list the usernames and passwords <em>Malteiro<\/em> commonly uses to gain access to SMTP servers.<\/li>\n<\/ol>\n<ul>\n<li><strong>Users<\/strong>: postmaster, test, admin, root, backup, postfix, ROOT, guest, user, exim, smtp, demo, blog, bin, database, db, daemon, distccd, ftp, web, http, games, gnats, irc, libuuid, list, lp, mail, man, news, nobody, postgres, proxy, service, administrator, sshd, sync, sys, syslog, email, uucp, www, www-data, local, remote, adm, shutdown, halt, operator, gopher, rpm, vcsa, dbus, ntp, canna, nscd, rpc, mailman, named, amanda, rpcuser, nsfnobody, pvm, apache, xfs, gdm, htt, mysql, webalizer, mailnull, smmsp, squid, ldap, netdump, pcap, radiusd, radvd, quagga, wnn, dovecot, info, nagios, oracle, testing, tester, webmaster, support, sales, ec2-user, vagrant, azureuser, webservice, webservices, services, username, default, start, main, home, tech, help, store, hi, null, system, public, forum, form, windows, linux, super, superuser, computer, adminadmin<\/li>\n<li><strong>Passwords<\/strong>: #user#, #user#123, #user#1, #User#, #User#123, #User#1, #USER#, #USER#123, #USER#1, pass123, password, P@ssw0rd, 123456, 654321, 12345678, 123456789, qwerty, asdfgh, abc123, abc123456, 1q2w3e, 1q2w3e4r, 123qwe, qwertyuiop, qwerty123<\/li>\n<li>Make users avoid storing usernames and passwords in Internet browsers.<\/li>\n<\/ul>\n<ol>\n<li>Integrate security policies at all levels of the organization, which consider the use of quality antivirus or EDR, always keeping them updated so that they always have the latest signatures published by manufacturers and thus significantly reduce chances of infection.<\/li>\n<li>Create awareness campaigns about the social engineering techniques cybercriminals use to distribute malware and the danger and impact phishing campaigns have on organizations.<\/li>\n<\/ol>\n<h1>IOC<\/h1>\n<p>45E03985103B25828E3D01A415958639DB0AED53564455908DAB35C803E69FCD<\/p>\n<p>3DF64DC17C397EF25702A74A2F5DC97EAED4E48B13E52E2735A9B32894FC09E7<\/p>\n<p>139[.]162[.]73[.]58@80\\SUECWRPQ\\SAT_HERRAMIENTA_SEGURIDAD[.]JSE<\/p>\n<p>139[.]162[.]73[.]58@80\\YTMPEOBW\\HERRAMIENTA_DE_SEGURIDAD_SII[.]JSE<\/p>\n<p>HXXPS[:]\/\/FJA[.]COM[.]MX\/WP-CONTENTS\/EXECUTION[.]PHP?TAG=RUSSIAN<\/p>\n<p>HXXPS[:]\/\/FJA[.]COM[.]MX\/WP-CONTENTS\/INIT[.]PHP?ID=1<\/p>\n<p>HXXPS[:]\/\/WWW[.]GRAFOCE[.]COM\/SCRIPTS\/INDEX[.]PHP?ID=2<\/p>\n<p>HXXPS[:]\/\/WWW[.]GRAFOCE[.]COM\/WP-CONTENTS\/EXECUTION[.]PHP?TAG=RUSSIAN<\/p>\n<p>HXXPS[:]\/\/RUSSIANCL[.]TOP\/BRAMX\/7684JASDTG[.]XLS<\/p>\n<p>HXXPS[:]\/\/RUSSIANCL[.]TOP\/BRAMX\/POST[.]PHP<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In the current threat landscape in Latin America, the Malteiro cybercriminal group (operators of the URSA\/Mispadu banking trojan) has<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-460","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}