{"id":800,"date":"2024-11-13T15:07:32","date_gmt":"2024-11-13T15:07:32","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=800"},"modified":"2024-11-13T15:07:32","modified_gmt":"2024-11-13T15:07:32","slug":"new-silver-shifting-yak-banking-trojan","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2024\/11\/13\/new-silver-shifting-yak-banking-trojan\/","title":{"rendered":"New Silver Shifting Yak Banking Trojan"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>The objective of this report is to describe the tactics, techniques, and procedures (TTPs) and provide indicators of compromise associated with a new banking trojan, identified by SCILabs as <em>Silver Shifting Yak<\/em>. Key characteristics of this Trojan include the dynamic alteration of URLs for its C2 server and the use of varying domain names throughout the infection chain. SCILabs identified this threat in October 2024 by monitoring and threat hunting in Latin America.<\/p>\n<p>The main objective of <em>Silver Shifting Yak<\/em> is to steal information from financial institutions such as Banco Ita\u00fa, Banco do Brasil, Banco Bandresco, Foxbit, and Mercado Pago Brasil, among others, as well as credentials used to access Microsoft portals such as Outlook, Azure, and Xbox, by monitoring the sites that the victims access through their web browser.<\/p>\n<p>Although SCILabs was unable to identify the Trojan&#8217;s distribution method, based on its experience with other threats in the region and the <strong>&lt;2 letters-4 numbers-3 letters&gt;.zip<\/strong> filename pattern identified (similar to the random digital document format used by other threats) it is likely to be distributed via malicious emails, using alleged invoices and digital documents as a pretext. This method is common in banking trojan-activity in Latin America, such as <em>Grandoreiro<\/em>, <a href=\"https:\/\/blog.scilabs.mx\/ursa-mispadu-analisis-de-overlaps-con-otras-amenazas\/\"><em>URSA\/Mispadu<\/em><\/a>, and <a href=\"https:\/\/blog.scilabs.mx\/silver-oryx-blade-nuevo-troyano-bancario-observado-en-agosto-de-2024\/\"><em>Silver Oryx Blade<\/em><\/a>, also discovered by SCILabs in August 2024.<\/p>\n<p>It is important to note that, as of the time of writing this report, several artifacts identified during the investigation and used in the <em>Silver Shifting Yak<\/em> infection chain have a low detection rate across antivirus solutions, according to the <a href=\"https:\/\/www.virustotal.com\/gui\/file\/f6da04a9ab64b81159fe3d53fd2b2e3522e31fb5c800f18f563c61bb07b6c231\">VirusTotal<\/a> <a href=\"https:\/\/www.virustotal.com\/gui\/file\/49cfc2a95b1b713cab05805cad959264b957c91da3147515d3e0a0e37463d694\/relations\">platform<\/a>. This increases the risk of compromise for employees of various organizations, making it essential for companies to remain vigilant against this threat.<\/p>\n<figure id=\"attachment_801\" aria-describedby=\"caption-attachment-801\" style=\"width: 324px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-801 size-full\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/1.png\" alt=\"\" width=\"324\" height=\"268\"><figcaption id=\"caption-attachment-801\" class=\"wp-caption-text\"><strong>Figure 1. Silver Shifting Yak Banking trojan<\/strong><\/figcaption><\/figure>\n<h2><strong>How could it affect an organization?<\/strong><\/h2>\n<p><em>Silver Shifting Yak <\/em>can steal information from financial institutions and Microsoft platforms from all types of users, including organization employees. If an attack is successful within an organization, cybercriminals can leak or sell the stolen information on underground forums of the Dark Web or in black markets. This puts the confidentiality, integrity, and availability of their information at risk and can result in reputational damage.<\/p>\n<h2>Analysis<\/h2>\n<h2>Threat Context<\/h2>\n<p>In October 2024, SCILabs identified the URL <strong>hxxps[:]\/\/nvidrive[.]com\/download\/b12aa4d64c6edf95dad972b211b79a64, <\/strong>which, when visited, initiates the download of a ZIP file with <strong>&lt;2 letters-4 numbers-3 letters&gt;.zip<\/strong> filename pattern, using the HTML <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/html-smuggling\/\">Smuggling<\/a> technique<strong>.<\/strong><\/p>\n<p>The template displayed upon visiting the URL presents a message in Brazilian Portuguese, notifying the user that the download is being prepared and will begin in 5 seconds. From this point on, all messages displayed by the website are shown in Portuguese, indicating that the campaign targets users in Brazil.<\/p>\n<figure id=\"attachment_803\" aria-describedby=\"caption-attachment-803\" style=\"width: 507px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-803\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/2-1.png\" alt=\"\" width=\"507\" height=\"256\"><figcaption id=\"caption-attachment-803\" class=\"wp-caption-text\"><strong>Figure 2. Template used on the malware download site<\/strong><\/figcaption><\/figure>\n<p>Once the counter has ended, the page displays a second message indicating that the download has been completed, and displays the <a href=\"https:\/\/winrar.es\/descargas\">WinRAR&nbsp;<\/a> icon image and the file name.<\/p>\n<figure id=\"attachment_804\" aria-describedby=\"caption-attachment-804\" style=\"width: 276px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/winrar.es\/descargas\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-804\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/3.png\" alt=\"\" width=\"276\" height=\"325\"><\/a><figcaption id=\"caption-attachment-804\" class=\"wp-caption-text\"><strong>Figure 3. Second message displayed on the page used to distribute malware<\/strong><\/figcaption><\/figure>\n<p>The domain includes several pages displaying messages like \u201cpage not found\u201d or \u201cunauthorized access,\u201d and hyperlinks prompting the user to return to the homepage, which redirects to the Google search engine. Additionally, some messages indicate that \u201clogs\u201d have been added or that the \u201ccounter\u201d parameter is missing, suggesting that the attackers keep track of all the computers visiting the site and downloading the malware. This tracking enables the attackers to verify the success of the trojan\u2019s distribution and manage the spread of the infection.<\/p>\n<figure id=\"attachment_805\" aria-describedby=\"caption-attachment-805\" style=\"width: 458px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-805\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/4.png\" alt=\"\" width=\"458\" height=\"222\"><figcaption id=\"caption-attachment-805\" class=\"wp-caption-text\"><strong>Figure 4. Additional messages displayed by the malicious website<\/strong><\/figcaption><\/figure>\n<p>It is important to note that the domain <strong>nvidrive[.]com<\/strong>, used by the threat actors to distribute the trojan, was registered in September 2024 through <a href=\"https:\/\/www.namecheap.com\/\">NameCheap, Inc<\/a>., a domain registration and <a href=\"https:\/\/www.hostinger.mx\/tutoriales\/que-es-un-hosting\">hosting<\/a> provider, which also offers domain privacy services. The main characteristics of the domain are the following:<\/p>\n<ul>\n<li><strong>Registration Privacy:<\/strong> there are no specific details about the owner in the <a href=\"https:\/\/www.redeszone.net\/tutoriales\/internet\/que-es-whois\/\">WHOIS<\/a>, indicating that a privacy service was likely used to hide the identity of the original registrant, a common practice in malicious activities to make attribution and tracing difficult.<\/li>\n<\/ul>\n<ul>\n<li><strong>Using <a href=\"https:\/\/www.cloudflare.com\/es-es\/learning\/what-is-cloudflare\/\">Cloudflare<\/a><\/strong><strong> as DNS<\/strong>: the domain is configured with <a href=\"https:\/\/servidoresseguros.com\/clientes\/index.php\/knowledgebase\/2\/iQue-es-un-DNS-nameserver-o-servidor-de-nombre.html\">Cloudflare nameservers<\/a>, allowing traffic to pass through their network. This helps hide the actual IP of the server hosting the malware, making it harder to identify the attacker\u2019s infrastructure and making it easier for operators to change the <a href=\"https:\/\/www.gluo.mx\/blog\/backend-que-es-y-para-que-sirve\">backend<\/a> quickly if detected.<\/li>\n<\/ul>\n<ul>\n<li><strong>Domain status \u201c<a href=\"https:\/\/www.icann.org\/resources\/pages\/epp-status-codes-2014-06-16-en\">clientTransferProhibited<\/a><\/strong><strong>\u201d:<\/strong> this status prevents the domain from being transferred to another registrar without authorization, allowing malware operators to maintain control of the domain and prevent it from being taken over by third parties in the event of a shutdown attempt or infrastructure theft.<\/li>\n<\/ul>\n<p>Given these characteristics, it is likely that the domain was created specifically for this campaign.<\/p>\n<figure id=\"attachment_807\" aria-describedby=\"caption-attachment-807\" style=\"width: 482px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-807\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/5-1.png\" alt=\"\" width=\"482\" height=\"249\"><figcaption id=\"caption-attachment-807\" class=\"wp-caption-text\"><strong>Figure 5. General information about the domain used to distribute malware<\/strong><\/figcaption><\/figure>\n<h2>Analysis<\/h2>\n<h2>Technical Summary<\/h2>\n<p>By analyzing the source code of the page hosted on <strong>nvidrive[.]com<\/strong> domain mentioned above, SCILabs identified JavaScript code designed to prevent displaying the source code, using <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/EventTarget\/addEventListener\">event listeners<\/a> to block right-click and key sequences such as \u201cCtrl + U\u201d.<\/p>\n<figure id=\"attachment_808\" aria-describedby=\"caption-attachment-808\" style=\"width: 446px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-808\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/6.png\" alt=\"\" width=\"446\" height=\"225\"><figcaption id=\"caption-attachment-808\" class=\"wp-caption-text\"><strong>Figure 6. Parsed JavaScript code snippet<\/strong><\/figcaption><\/figure>\n<p>The downloaded file is a ZIP archive named according to the pattern <strong>&lt;2 letters-4 numbers-3 letters&gt;.zip<\/strong>. It contains an empty folder named \u201c__data\u201d and an X64 executable file developed in C++ of approximately 30MB, both using the same name.<\/p>\n<figure id=\"attachment_809\" aria-describedby=\"caption-attachment-809\" style=\"width: 311px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-809\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/7.png\" alt=\"\" width=\"311\" height=\"168\"><figcaption id=\"caption-attachment-809\" class=\"wp-caption-text\"><strong>Figure 7. Contents of the ZIP file<\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_810\" aria-describedby=\"caption-attachment-810\" style=\"width: 519px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-810\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/8.png\" alt=\"\" width=\"519\" height=\"155\"><figcaption id=\"caption-attachment-810\" class=\"wp-caption-text\"><strong>Figure 8. General information about the executable file<\/strong><\/figcaption><\/figure>\n<p>The executable file imports several libraries, such as Kernel32.dll, User32.dll, and Ole32.dll, which provide access to system resources such as files, services, and processes, and facilitates data manipulation. It also includes libraries from the Microsoft C Runtime Library <a href=\"https:\/\/learn.microsoft.com\/en-us\/cpp\/c-runtime-library\/c-run-time-library-reference?view=msvc-170\">(API-MS-CRT)<\/a> series, which provide functions such as random value generation, date and time operations, access to environment variables, system configuration, and string manipulation, among others.<\/p>\n<figure id=\"attachment_811\" aria-describedby=\"caption-attachment-811\" style=\"width: 336px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-811\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/9.png\" alt=\"\" width=\"336\" height=\"309\"><figcaption id=\"caption-attachment-811\" class=\"wp-caption-text\"><strong>Figure 9. Libraries imported by the executable file<\/strong><\/figcaption><\/figure>\n<p>When executed, the mentioned file initially acts as a dropper, extracting a ZIP archive to the location <em>%ProgramData%\/[directory with a&nbsp;random letter name]<\/em>, containing a copy of the same file and a malicious DLL written on .NET, which acts as a loader for the final payload of the trojan. The names of the ZIP archive, the files contained in it, and the created directory are random strings of variable length with no identifiable pattern so far.<\/p>\n<figure id=\"attachment_812\" aria-describedby=\"caption-attachment-812\" style=\"width: 466px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-812\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/10.png\" alt=\"\" width=\"466\" height=\"102\"><figcaption id=\"caption-attachment-812\" class=\"wp-caption-text\"><strong>Figure 10. Contents of the unpacked ZIP file in the trojan installation directory<\/strong><\/figcaption><\/figure>\n<p>After the Trojan is installed, it stores the domain of its command and control (C2) server in the registry key HK_CU\/Environment\/SFA and a URL to download the payload in HK_CU\/Environment\/SFL. Both values \u200b\u200bare stored in base64 encoding. HKEY_CURRENT_USER\\Environment is commonly used to store custom environment variables that affect the user\u2019s working environment when logging in. Since this key does not require administrative permissions to be modified, it is also used in malicious campaigns.<\/p>\n<figure id=\"attachment_814\" aria-describedby=\"caption-attachment-814\" style=\"width: 535px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-814\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/11-1.png\" alt=\"\" width=\"535\" height=\"44\"><figcaption id=\"caption-attachment-814\" class=\"wp-caption-text\"><strong>Figure 11. Registry keys where the domain and a download URL for the C2 trojan are stored<\/strong><\/figcaption><\/figure>\n<p><em>Silver Shifting Yak<\/em> then establishes persistence via a PowerShell script in the HKEY_CU\/Environment\/UserInitMprLogonScript registry key, allowing the malware to run automatically every time the user logs into Windows.<\/p>\n<figure id=\"attachment_816\" aria-describedby=\"caption-attachment-816\" style=\"width: 1872px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-816 size-full\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/12-1.png\" alt=\"\" width=\"1872\" height=\"112\"><figcaption id=\"caption-attachment-816\" class=\"wp-caption-text\"><strong>Figure 12. PowerShell script used to generate persistence<\/strong><\/figcaption><\/figure>\n<p>Subsequently, the DLL developed in C# .NET, obfuscated with <a href=\"https:\/\/developer.mozilla.org\/es\/docs\/Glossary\/Base64\">base64<\/a>, and also stored in the <em>%ProgramData%\/[directory with random letter name]<\/em> directory, is loaded into memory for the purpose of executing the following actions:<\/p>\n<ul>\n<li>Recover the C2 stored in the Windows registry.<\/li>\n<\/ul>\n<figure id=\"attachment_818\" aria-describedby=\"caption-attachment-818\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-818\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/13-1.png\" alt=\"\" width=\"500\" height=\"126\"><figcaption id=\"caption-attachment-818\" class=\"wp-caption-text\"><strong>Figure 13. C2 Recovery from Windows Registry<\/strong><\/figcaption><\/figure>\n<ul>\n<li>Download the payload that is encrypted using <a href=\"https:\/\/www.pandasecurity.com\/es\/mediacenter\/cifrado-aes-guia\/\">AES<\/a> and base64, the decryption key, and the initialization vector from a URL that changes on each execution of the trojan, since it is generated using a <a href=\"https:\/\/learn.microsoft.com\/es-es\/dotnet\/api\/system.guid.newguid?view=net-8.0\">GUID<\/a> and the current <a href=\"https:\/\/learn.microsoft.com\/es-es\/dotnet\/api\/system.datetime?view=net-8.0\">DATETIME<\/a> value of the infected computer.<\/li>\n<\/ul>\n<figure id=\"attachment_819\" aria-describedby=\"caption-attachment-819\" style=\"width: 464px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-819\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/14.png\" alt=\"\" width=\"464\" height=\"100\"><figcaption id=\"caption-attachment-819\" class=\"wp-caption-text\"><strong>Figure 14. The code snippet that constructs a Silver Shifting Yak download URL using a GUID<\/strong><\/figcaption><\/figure>\n<ul>\n<li>Using <a href=\"https:\/\/learn.microsoft.com\/es-es\/windows\/win32\/api\/processthreadsapi\/nf-processthreadsapi-createthread\">CreateThread<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/api\/synchapi\/nf-synchapi-waitforsingleobject\">WaitForSingleObject<\/a> APIs, the final payload of the trojan is injected into memory.<\/li>\n<\/ul>\n<figure id=\"attachment_820\" aria-describedby=\"caption-attachment-820\" style=\"width: 488px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-820\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/15.png\" alt=\"\" width=\"488\" height=\"217\"><figcaption id=\"caption-attachment-820\" class=\"wp-caption-text\"><strong>Figure 15. Silver Shifting Yak Final payload injection<\/strong><\/figcaption><\/figure>\n<figure id=\"attachment_821\" aria-describedby=\"caption-attachment-821\" style=\"width: 338px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-821\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/16.png\" alt=\"\" width=\"338\" height=\"45\"><figcaption id=\"caption-attachment-821\" class=\"wp-caption-text\"><strong>Figure 16. Silver Shifting Yak process in progress<\/strong><\/figcaption><\/figure>\n<p>Once executed, the<em> Silver Shifting Yak<\/em> starts monitoring the victim&#8217;s browser, with the aim of stealing information from Brazilian banks and certain Microsoft sites by using <a href=\"https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/API\/WebSockets_API\">WebSockets<\/a>.<\/p>\n<figure id=\"attachment_822\" aria-describedby=\"caption-attachment-822\" style=\"width: 482px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-822\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/17.png\" alt=\"\" width=\"482\" height=\"247\"><figcaption id=\"caption-attachment-822\" class=\"wp-caption-text\"><strong>Figure 17. Strings, identified in memory, related to the monitoring of Brazilian banking institutions and Microsoft websites during dynamic analysis&nbsp;<\/strong><\/figcaption><\/figure>\n<p>During the analysis, around 50 banks and financial institutions of interest to <em>Silver Shifting Yak<\/em> were identified, including entities such as Mercado Pago and Binance, as well as Microsoft services such as Azure, Live, and Outlook.<\/p>\n\n\n<figure class=\"wp-block-table aligncenter\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td class=\"has-text-align-center\" colspan=\"4\" data-align=\"center\"><strong>Domains monitored by Silver Shifting Yak<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">bancobrasil.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">santandernet.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">unicred.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancotopazio.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">internetbanking.caixa.gov.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">santandernetibe.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">safra.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">citidirect.com<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">gerenciador.caixa.gov.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">itau.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">brde.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">zeitbank.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">loginx.caixa.gov.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">meu.original.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">banese.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">banestes.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">banco.bradesco<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">banrisul.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancobmg.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">rendimento.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">cidadetran.bradesco<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">internetbanking.banpara.b.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">brbbanknet.brb.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">viacredi.coop.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">binance.com<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancoamazonia.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">internetbanking.confesol.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">sicredi.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">mercadobitcoin.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">ecode.daycoval.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">tribanco.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">mercadopago.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">bitcointrade.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">mercantildobrasil.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">credisisbank.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancotopazio.com.br<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">foxbit.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">stone.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">credisan.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">azure.com<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">blockchain.com<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancopan.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancobs2.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">live.com<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">accounts.binance.com<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">santandernet.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">bancofibra.com.br<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">hotmail.com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figcaption class=\"wp-element-caption\"><strong>Table 1. Banking Institutions Sites of Interest for <em>Silver Shifting Yak<\/em><\/strong><\/figcaption><\/figure>\n<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a>\n\nIt is important to note that during the analysis, some similarities were identified in several capabilities and tools used by <em>Silver Shifting Yak<\/em>, <a href=\"https:\/\/blog.scilabs.mx\/silver-oryx-blade-nuevo-troyano-bancario-observado-en-agosto-de-2024\/\"><em>Silver Oryx Blade<\/em><\/a>, and <a href=\"https:\/\/blogs.blackberry.com\/en\/2024\/07\/coyote-banking-trojan-targets-latam-with-a-focus-on-brazilian-financial-institutions\"><em>Coyote<\/em><\/a>, such as the use of AES encryption for specific strings in the infection chain, WebSockets for communication with the C2, monitoring web traffic, and the use of <a href=\"https:\/\/www.newtonsoft.com\/json\">Newtonsoft&#8217;s<\/a> Json.NET framework for manipulating data transmitted to the C2, as well as <a href=\"https:\/\/github.com\/Fody\/Costura\">Fody Costura<\/a> for embedding .NET resources.\n\nSCILabs has a medium confidence hypothesis that the operators of the <em>Silver Oryx Blade<\/em> banking trojan could be the same as those of the <em>Coyote<\/em> banking trojan and, given what was found in this research, they could also be related to <em>Silver Shifting Yak<\/em>. Due to the substantial changes observed in the campaigns of these three trojans, they have been classified as malware variants possibly operated by the same threat group.\n\nThis variability allows attackers to:\n<ul>\n \t<li>Adapt their TTPs to different target environments.<\/li>\n<\/ul>\n<ul>\n \t<li>Evade detection.<\/li>\n<\/ul>\n<ul>\n \t<li>Optimize the impact of their campaigns.<\/li>\n<\/ul>\n<ul>\n \t<li>Keep their campaigns active and effective against security defenses.<\/li>\n<\/ul>\n<ul>\n \t<li>Make analysis and attribution to a single threat group difficult.<\/li>\n<\/ul>\n<h2><strong>Notable features of Silver Shifting Yak, Silver Oryx Blade, and Coyote<\/strong><\/h2>\nBelow are the primary <em>Silver Shifting Yak <\/em>features, compared with those observed in previous campaigns of <em>the Silver Oryx Blade<\/em> trojan and <em>Coyote<\/em> observed in the region. This analysis aims to enhance clarity in identifying this new threat for future research.\n\n<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a>\n<table style=\"height: 1531px;\" width=\"891\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>\u00a0<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\"><strong><em>Silver Shifting Yak<\/em><\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\"><strong><em>Silver Oryx Blade<\/em><\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\"><strong><em>Coyote<\/em><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Programming languages<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">C# &amp; C++<\/td>\n<td style=\"text-align: center;\" width=\"161\">C# &amp; C++<\/td>\n<td style=\"text-align: center;\" width=\"161\">C#, C++ &amp; NIM<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Tools and libraries<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">Fody Costura, Watson TCP,\n\nJson.NET de Newtonsoft<\/td>\n<td style=\"text-align: center;\" width=\"161\">Fody Costura, Watson TCP, Json.NET de Newtonsoft<\/td>\n<td style=\"text-align: center;\" width=\"161\">Fody Costura, Watson TCP, Squirrel, NuGet<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Payload format<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">Web Request Strings<\/td>\n<td style=\"text-align: center;\" width=\"161\">Plain text files<\/td>\n<td style=\"text-align: center;\" width=\"161\">PE<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Loading and injection methods<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1055\/\">Memory-Injection<\/a>: CreateThread y WaitForSingleObject<\/td>\n<td style=\"text-align: center;\" width=\"161\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\">DLL-SideLoading<\/a><\/td>\n<td width=\"161\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/002\/\">DLL-SideLoading<\/a>\n<p style=\"text-align: center;\"><\/p>\n<p style=\"text-align: center;\">y <a href=\"https:\/\/learn.microsoft.com\/es-es\/dotnet\/standard\/clr\">CLR<\/a><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Persistence method<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">HKCU\\Environment\\\nUserInitMprLogonScript and PowerShell scripts<\/td>\n<td style=\"text-align: center;\" width=\"161\">Shortcut in Windows startup folder<\/td>\n<td width=\"161\">HKCU\\Environment\\\n<p style=\"text-align: center;\"><\/p>\n<p style=\"text-align: center;\">UserInitMprLogonScript<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Installation window<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">No installation window<\/td>\n<td style=\"text-align: center;\" width=\"161\">No installation window<\/td>\n<td style=\"text-align: center;\" width=\"161\">Personalized<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Trojan size<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">Around 30MB<\/td>\n<td style=\"text-align: center;\" width=\"161\">Less than 2MB<\/td>\n<td style=\"text-align: center;\" width=\"161\">More than 100MB in some campaigns<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>C2<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">One domain per campaign, with\nmultiple unique URLs generated\nusing a GUID and a DATETIME<\/td>\n<td style=\"text-align: center;\" width=\"161\">Multiple domains in a single campaign<\/td>\n<td style=\"text-align: center;\" width=\"161\">Multiple domains in a single campaign<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Encryption and obfuscation methods<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">AES, base64<\/td>\n<td style=\"text-align: center;\" width=\"161\">AES, base64<\/td>\n<td style=\"text-align: center;\" width=\"161\">AES, base64<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Notable technique<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\">Using GUIDs to generate unique URLs<\/td>\n<td style=\"text-align: center;\" width=\"161\">Using GUIDs to generate directories with unique names<\/td>\n<td width=\"161\">&#8211;<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"161\"><strong>Label assigned by most antivirus solutions on VirusTotal<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"161\"><em>Generic trojan<\/em><\/td>\n<td style=\"text-align: center;\" width=\"161\"><em>Generic trojan<\/em><\/td>\n<td style=\"text-align: center;\" width=\"161\"><em>Coyote<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><strong>Table 2. Differences between <em>Silver Oryx Blade and Coyote<\/em><\/strong><\/p>\n<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a>\n\nIn conclusion, all three trojans exhibit significant differences in their artifacts and TTPs. However, they share key similarities, such as the use of C++ and C# programming languages, AES encryption, MD5 obfuscation, shared libraries, and development techniques that can reveal insights into a threat actor\u2019s methodology, such as the use of GUIDs to randomize strings. This analysis allows us to hypothesize that all three trojans are operated by the same threat actors. SCILabs will, therefore, conduct threat profiling to confirm or rule out this hypothesis.\n<h1>Attack Flow Summary<\/h1>\n<ul>\n \t<li>Although the distribution method could not be identified, it is highly likely that the target user is a victim of phishing emails or malvertising campaigns with pretexts related to invoices and digital documents.<\/li>\n<\/ul>\n<ul>\n \t<li>The user is redirected to a fake site that automatically downloads a compressed file in ZIP format, which contains the first <em>Silver Shifting Yak<\/em> dropper in EXE format.<\/li>\n<\/ul>\n<ul>\n \t<li>Once the victim extracts the executable file and runs it, the deployment of the banking trojan begins, performing the following tasks:<\/li>\n<\/ul>\n<ul>\n \t<li>It downloads a second ZIP file that contains the same executable opened for the first time and a DLL that works as a loader for the Trojan.<\/li>\n<\/ul>\n<ul>\n \t<li>The ZIP file is decompressed in <em>%ProgramData%\/[directory with a random letter name].<\/em><\/li>\n<\/ul>\n<ul>\n \t<li>Persistence is established through a PowerShell script in the HKEY_CU\/Environment\/UserInitMprLogonScript registry key.<\/li>\n<\/ul>\n<ul>\n \t<li>The domain of its command and control (C2) server is stored in the HK_CU\/Environment\/SFA registry key, and a URL to download the payload is stored in HK_CU\/Environment\/SFL.<\/li>\n<\/ul>\n<ul>\n \t<li><em>Silver Shifting Yak<\/em> loads the DLL stored in %ProgramData%\/[directory with random letter name] into memory.<\/li>\n<\/ul>\n<ul>\n \t<li>The DLL obtains the final payload of the trojan and loads it into memory.<\/li>\n<\/ul>\n<ul>\n \t<li><em>Silver Shifting Yak<\/em> monitors the victim&#8217;s browser activity, being able to read and verify the name of the open windows.<\/li>\n<\/ul>\n<ul>\n \t<li>When the user visits a site of interest to the trojan, it steals confidential information such as username and password to later share it with the attacker&#8217;s command and control server.<\/li>\n<\/ul>\n<h1 style=\"text-align: justify; line-height: 115%;\">Attack Flow Diagram<\/h1>\n<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a>\n\n<figure id=\"attachment_823\" aria-describedby=\"caption-attachment-823\" style=\"width: 720px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-823 \" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/18.png\" alt=\"\" width=\"720\" height=\"581\" \/><figcaption id=\"caption-attachment-823\" class=\"wp-caption-text\"><strong>Figure 12. General diagram of the Silver Shifting Yak attack flow<\/strong><\/figcaption><\/figure>\n<h1><\/h1>\n<h1><strong>Observed TTPs aligned to the MITRE ATT&amp;CK framework<\/strong><\/h1>\n<figure id=\"attachment_826\" aria-describedby=\"caption-attachment-826\" style=\"width: 1282px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-826 size-full\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/19-1.png\" alt=\"\" width=\"1282\" height=\"805\" \/><figcaption id=\"caption-attachment-826\" class=\"wp-caption-text\"><strong>Table 3. Observed TTPs aligned with the MITRE ATT&amp;CK framework<\/strong><\/figcaption><\/figure>\n<h1>Conclusion<\/h1>\nSCILabs considers <em>Silver Shifting Yak<\/em> a significant threat in the region due to its advanced techniques for generating dynamic C2 URLs, enabling it to evade security solutions, as well as the the low detection rate of some of its artifacts. Its ability to steal information from platforms like Azure poses a considerable risk for organizations. Furthermore, if a close relationship with <em>Silver Oryx Blade<\/em> and <em>Coyote <\/em>is confirmed, under the same operators, these threat actors would pose a greater risk due to their ongoing development and enhancement of malicious artifacts, as well as their efforts to evade detection by cybersecurity tools.\n\nIt is likely that in the future, this trojan will extend its activity to other Latin American countries like Mexico and Brazil, and that other trojans, such as <em>Grandoreiro<\/em>, <em>Mekotio<\/em>, and <em>Red Mongoose Daemon<\/em>, will adopt some of the TTPs described in this report.\n\nSCILabs considers it\u00a0essential that institutions and companies monitor TTP updates and indicators of compromise to reduce the risk of infection and mitigate the impact of banking information theft on their operations, and recommend the following actions:\n<ul>\n \t<li>Add the IoCs shared in this document to your security solutions.<\/li>\n<\/ul>\n<ul>\n \t<li>Regarding emails, it is recommended to:\n<ul>\n \t<li>Avoid opening emails from unknown senders.<\/li>\n \t<li>Avoid opening suspicious links.<\/li>\n \t<li>Avoid opening or downloading suspicious files.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n \t<li>Perform threat-hunting activities on EndPoint processes, looking for suspicious processes from folders like <em>%ProgramData%\/[directory with a random letter name].<\/em><\/li>\n<\/ul>\n<ul>\n \t<li>Perform threat-hunting tasks looking for the existence of the registry key, <em>HKCU\\Environment\\UserInitMprLogonScript<\/em>. If it does exist, verify that the applications executed are legitimate and have been installed by the user or the organization.<\/li>\n<\/ul>\n<ul>\n \t<li>If any hint of <em>Silver Shifting Yak<\/em> is found in any of your organization&#8217;s computers, it is recommended to find out what accounts were used, and change passwords immediately.<\/li>\n<\/ul>\n<ul>\n \t<li>Perform threat-hunting activities on your EndPoints for registry keys in the HK_CU\/Environment\/SFA and HK_CU\/Environment\/SFL paths with AES or base64 encrypted values \u200b\u200band conduct further investigation to rule out or confirm a banking trojan infection.<\/li>\n<\/ul>\n<h1>Indicators of compromise<\/h1>\nBelow are the indicators of compromise obtained from the analysis performed by SCILabs, with a <strong>HIGH<\/strong> level confidence.\n<h2><strong>Hashes SHA256<\/strong><\/h2>\ne8055a433f99526ac29105b6c3ec96083bde5c912b485d70e459883a000c85f8\n\nb4daf63ba7b0c05c086523aeef11eb279fded4f7d364680f741dfba20705ae8d\n\na30ec0ebda2cb7e1bff43f27190386ab98d1fafc239105e169a3963444802325\n\n8f2cc308845a85760eac118593e35e94a55685876cb34cdc0db718ee4272aecf\n\nf6da04a9ab64b81159fe3d53fd2b2e3522e31fb5c800f18f563c61bb07b6c231\n\nfaad20f7349f655cc40716f0c57301307da55702ede83889c2e9b807bb6c7358\n\n0fad1477d02d3387ea45416c9e89a4469191f16bc0835a91803cce49f09c5408\n\nc1b5cd14a2d917bc699e6e3034dc5c00f5d719966af5cf8f862755aef7ea54b9\n\n49cfc2a95b1b713cab05805cad959264b957c91da3147515d3e0a0e37463d694\n\n4ecd197919beb808c5e60247dae7bdaabfdab659dce65af626e41bf729ff032a\n\n540090ae78b03c3cb999526c1e5cddfc0bb417d68867969a6d2b3bc902aa6cfb\n\ne84659f08b03c4ab1a831e175da945d4e34afc7e8a055376919ae98a9827e39b\n\n2bb110ecf7657d7bc4114043fb2c9e8d9310219949db932b6508a7199f461348\n\n624f7251bc89584044756aba322096b70f181f73719bf6c9861589f0ceaf4dee\n\na7a2edab3da3a9908ce8d9cacfb9f377f031c963f62ab196ab59f18af8656e56\n\n624f7251bc89584044756aba322096b70f181f73719bf6c9861589f0ceaf4dee\n\n524860dfdd3aa03314ac4782e661c7d9ad97a5282021be03cd62c15277156928\n\n3f0be82c10017efe6c2f42fa5450e43a25f732dbf7bd5f06135eab3b8832477f\n\n9b37cb23291ba500b24b59a814b55418a65434609dcd0e3e386c35231e184f4d\n<h2><strong>URLs and domains<\/strong><\/h2>\nFull URL blocking is recommended to avoid future false positives or interruptions in the operation.\n\ncirculomaximo[.]com\n\nstakbeef[.]com\n\nhxxps[:]\/\/nvidrive[.]com\/download\/b12aa4d64c6edf95dad972b211b79a64\n\nhxxps[:]\/\/circulomaximo[.]com\/0764851f-9f5b-44ae-9c3b-31daec27f939?d=NGE1MjdmODNhM2E0Y2E3ZTFkNzBhZGIyNmEzNWI3MmU=&amp;t=2&amp;p=MjAyNC0wOS0yM1QwODo0NzozNi43MjBa\n\nhxxps[:]\/\/stakbeef[.]com\/mickipbbgblzsdtwieljmons\/jwijlmpriowikhgaiqbraydrxbd\/mtyuzwakzcgjgjqhfjjcrgcro\/?d=NGE1MjdmODNhM2E0Y2E3ZTFkNzBhZGIyNmEzNWI3MmU=&amp;t=2&amp;p=MjAyNC0xMC0yOVQxODo1MToxOC4xMzla\n","protected":false},"excerpt":{"rendered":"<p>Overview The objective of this report is to describe the tactics, techniques, and procedures (TTPs) and provide indicators of compromise<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-800","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=800"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/800\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}