{"id":838,"date":"2024-12-04T16:10:55","date_gmt":"2024-12-04T16:10:55","guid":{"rendered":"https:\/\/blog.scilabs.mx\/en\/?p=838"},"modified":"2024-12-04T16:10:55","modified_gmt":"2024-12-04T16:10:55","slug":"operation-saci-observed-during-november-2024","status":"publish","type":"post","link":"https:\/\/blog.scilabs.mx\/en\/2024\/12\/04\/operation-saci-observed-during-november-2024\/","title":{"rendered":"Operation Saci, observed during november 2024"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/12\/Op-Saci-e1733328616580.png\" alt=\"\" class=\"wp-image-883\" width=\"-221\" height=\"-107\" \/><\/figure><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h1>\n\n\n\n<p>The following report aims to provide indicators of compromise, along with the technical tactics and procedures associated with a malware campaign named by SCILabs as <em>Operation Saci<\/em>, which was identified during the second week of November 2024 through ongoing threat monitoring and hunting activities in Latin America.<\/p>\n\n\n\n<p>After conducting an investigation, SCILabs observed that the <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> malware families are being distributed through <em>Operation Saci<\/em>. Given the impersonated institution (Citibanamex) and the impacted banks, it is highly likely that the installed banking Trojan is targeting Mexico.<\/p>\n\n\n\n<p><em>Operation Saci<\/em>&#8216;s distribution method is phishing emails, which may contain a hyperlink or an attached PDF file, using pretexts related to invoices, pending payment receipts, or payment vouchers. Its main objective is to distribute the <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> malware families, which aim to steal banking information from users of different financial institutions through the overlapping of windows. In the case of some <em>URSA\/Mispadu<\/em> installations, they may also steal browser history, Outlook credentials, and SMTP access.<\/p>\n\n\n\n<p>It is important to mention that, during this investigation, SCILabs found different overlaps between various aspects of the <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> infection chain. First, the <em>Grandoreiro<\/em> infection will be addressed broadly (as it represents the final stage in this specific campaign) before highlighting the similarities between both attack flows and describing them in detail.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>How could it affect an organization?<\/strong><\/h1>\n\n\n\n<p>The malware families distributed by <em>Operation Saci<\/em> can steal banking and confidential information (such as browsing history and Outlook credentials) from all types of users, including employees of public and private entities. If an attack is successful within the organization, cybercriminals may leak or sell the stolen information in clandestine Dark Web forums or black markets, compromising the confidentiality, integrity and availability of the data, and leading to potential financial and reputational losses for clients.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Analysis<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">General context of the threat<\/h2>\n\n\n\n<p>During the second week of November 2024, through ongoing threat monitoring and hunting activities in Latin America, SCILabs identified an email containing an attached PDF file \u2014protected by a password included in the same email\u2014 named after the victim&#8217;s email address. The email &nbsp;uses the pretext an alleged payment receipt to &nbsp;impersonate Citibanamex. It was determined, with a high level of confidence that this specific campaign is targeted at Mexico.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_1.png\" alt=\"Figure 1. Visual appearance of the attached PDF file\" class=\"wp-image-846\" width=\"497\" height=\"645\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 1. Visual appearance of the attached PDF file<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_2.png\" alt=\"Figure 2. Phishing email visual appearance\" class=\"wp-image-848\" width=\"573\" height=\"236\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 2. Phishing email visual appearance<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Technical summary of <em>Grandoreiro\u2019s<\/em> installation process<\/strong><\/h2>\n\n\n\n<p>The PDF file contains an embedded hyperlink. When the victims click on it, they are redirected to a site where a file named \u201c<strong>\u2749\ud835\udd38\ud835\udd63\ud835\udd54\ud835\udd59\ud835\udd5a\ud835\udd67\ud835\udd60\ud835\udd64\u2749_\u2460\u2460\u2468\u2463\u2460\u2460<\/strong>,\u201d in ZIP format is automatically downloaded. However, those numbers vary with each download.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_3-1024x527.png\" alt=\"Figure 3. Visual appearance of the automatic download site\" class=\"wp-image-849\" width=\"730\" height=\"376\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 3. Visual appearance of the automatic download site<\/strong><\/p>\n\n\n\n<p>The ZIP contains a file in HTA format (with the same name as the compressed file) which includes the instructions to download and execute a JavaScript script.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_4-1024x152.png\" alt=\"Figure 4. Content of the compressed file\" class=\"wp-image-850\" width=\"822\" height=\"122\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 4. Content of the compressed file<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_5-1024x171.png\" alt=\"Figure 5. Code fragment contained in the HTA file\" class=\"wp-image-851\" width=\"856\" height=\"143\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 5. Code fragment contained in the HTA file<\/strong><\/p>\n\n\n\n<p>Furthermore, as an additional defense evasion mechanism, the malware displays an alleged password validator, typical of other malware families like <em>URSA\/Mispadu<\/em>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_6.png\" alt=\"Figure 6. Password validator used by Grandoreiro in this campaign\" class=\"wp-image-852\" width=\"547\" height=\"242\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 6. Password validator used by <em>Grandoreiro<\/em> in this campaign<\/strong><\/p>\n\n\n\n<p>After the validation, the second stage of the infection begins. The script named <strong>6725c86d7fa55.js<\/strong> is responsible for downloading an additional dropper in VBS format installed within the <em>%PUBLIC%<\/em> directory.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_7-1024x90.png\" alt=\"Figure 7. Code fragment contained in the JavaScript file\" class=\"wp-image-853\" width=\"842\" height=\"74\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 7. Code fragment contained in the JavaScript file<\/strong><\/p>\n\n\n\n<p>This dropper performs the following tasks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Code Formatting: formats a text string corresponding to PowerShell code.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Download: this function downloads a second file in VBS format that works as a <em>Grandoreiro<\/em> dropper and saves it within the <em>%PUBLIC%<\/em> directory.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Execution: executes the following <em>Grandoreiro<\/em> dropper, which is also in VBS format.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_8-1024x109.png\" alt=\"Figure 8. Code fragment contained in the first VBS file\" class=\"wp-image-854\" width=\"845\" height=\"90\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 8. Code fragment contained in the first VBS file<\/strong><\/p>\n\n\n\n<p>This second dropper performs the following tasks:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download: opens the site <strong>hxxp[:]\/\/62[.]113[.]116[.]63\/mx01\/cancun01[.]zip<\/strong> and downloads a compressed file in ZIP format named \u201ccancun01\u201d.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Execution: searches for executable files (with EXE extension) within the compressed file; if it finds any, it automatically runs it.<\/li><\/ul>\n\n\n\n<p>Information registration: obtains the name of the infected computer and through a GET request with the form <strong>hxxp[:]\/\/62[.]113[.]116[.]63\/conta[.]mx\/index[.]php?nomepc=[equipo_name]<\/strong> shares it with its command server and control.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_9-1024x103.png\" alt=\"Figure 9. Code fragment contained in the second VBS file\" class=\"wp-image-855\" width=\"875\" height=\"88\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 9. Code fragment contained in the second VBS file<\/strong><\/p>\n\n\n\n<p>SCILabs identified that the compressed name cancun01.zip contains four files, which were observed in a campaign documented by SCILabs in July of this year and are described below:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>CSRPS.exe<\/strong>: this is a legitimate file that belongs to an application called Beyond Compare11.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>CSRPS.dll<\/strong> and <strong>unrar.dll<\/strong>: these are two legitimate libraries necessary to execute &#8220;CSRPS.exe.&#8221;<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>7zxa.dll<\/strong>: corresponds to the malicious library, which uses the <em>Grandoreiro<\/em>&#8216;s technique of increasing its size to make it challenging for security tools to analyze static and dynamic data. In this case, it weighs almost 2GB.<\/li><\/ul>\n\n\n\n<p>It is worth mentioning that these artifacts are unzipped to a randomly named folder in the root of C:\\ composed of &lt;one number&gt;&lt;one capital letter&gt;&lt;three lowercase letters&gt;&lt;three numbers&gt;<\/p>\n\n\n\n<p>The DLL 7zxa.dll is loaded into memory by the CSRPS.exe executable using the <a href=\"http:\/\/[1] https:\/\/www.elladodelmal.com\/2021\/04\/que-es-una-dll-y-en-que-consiste-el-dll.html\" data-type=\"URL\" data-id=\"[1] https:\/\/www.elladodelmal.com\/2021\/04\/que-es-una-dll-y-en-que-consiste-el-dll.html\">DLL Hijacking<\/a> technique. In this case, the technique exploits the <strong><a href=\"https:\/\/vuldb.com\/?id.274873\" data-type=\"URL\" data-id=\"https:\/\/vuldb.com\/?id.274873\">CVE-2024-7886<\/a><\/strong> vulnerability by replacing the original library with a malicious one crafted by the attacker.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_10.png\" alt=\"Figure 10. Evidence of the existence of the DLL Hijacking vulnerability\" class=\"wp-image-856\" width=\"399\" height=\"109\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 10. Evidence of the existence of the DLL Hijacking vulnerability<\/strong><\/p>\n\n\n\n<p>During the dynamic analysis of the artifacts, the SCILabs team identified that the malware records the computer&#8217;s infection in a log that contains the victim&#8217;s IP address and the names of the files that were downloaded.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_11-1024x235.png\" alt=\"Figure 11. Fragment of victim registration log\" class=\"wp-image-857\" width=\"797\" height=\"183\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 11. Fragment of victim registration log<\/strong><\/p>\n\n\n\n<p>Furthermore, within the text strings of the process deployed by the malware, some of the target banks (all of them from Mexico) could be observed.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><td><strong>Bank<\/strong><strong><\/strong><\/td><\/tr><\/thead><tbody><tr><td>Citibanamex<\/td><\/tr><tr><td>Afirme<\/td><\/tr><tr><td>Banco Azteca<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Table 1. Banks targeted by <em>Grandoreiro<\/em> in this campaign<\/strong><\/p>\n\n\n\n<p>Finally, the Trojan generates persistence within the Windows registry keys at <em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary of the attack flow observed in the <em>Grandoreiro<\/em> campaign<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The user receives a phishing email using pretexts related to pending payment receipts, invoices, or vouchers.<\/li><li>The email contains a password-protected PDF file with a hyperlink embedded in it.<\/li><li>If the user clicks on the hyperlink, they are redirected to an automatic download site from where they obtain a compressed file in ZIP format.<\/li><li>If the user decompresses the file, they obtain a file in HTA format, corresponding to the first malware dropper.<\/li><li>If the user executes the HTA, the malicious banking Trojan activity described below begins:<ul><li>Deploys a password validator.<\/li><\/ul><ul><li>If the user solves it correctly, it leads to the next malware stage.<\/li><li>Executes a script in JS format that is responsible for launching a dropper in VBS format.<\/li><li>A second VBS dropper is installed in the <em>%PUBLIC%<\/em> directory. It is responsible for downloading a compressed file in ZIP format containing a legitimate executable and a malicious DLL that is loaded into memory and corresponds to the <em>Grandoreiro<\/em> payload.<\/li><li>Information from the victim&#8217;s computer is shared with its command-and-control server.<\/li><\/ul><ul><li>The Trojan generates persistence within the Windows registry keys in <em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>.<\/li><\/ul><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"> <strong>Summary of the attack flow observed in the <em>Grandoreiro<\/em> campaign<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_12_en-1024x677.png\" alt=\"Figure 12. Grandoreiro's observed attack flow\" class=\"wp-image-858\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 12. <em>Grandoreiro<\/em>&#8216;s observed attack flow<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Overlaps observed between <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/h1>\n\n\n\n<p>SCILabs identified the following overlaps during the analysis of the <em>Grandoreiro<\/em> campaign described earlier in this report, which together give rise to <em>Operation Saci<\/em>.<\/p>\n\n\n\n<p>After performing the corresponding analysis, SCILabs identified numerous coincidences between the <em>Grandoreiro<\/em> infection chains and those of <em>URSA\/Mispadu<\/em> (observed in previous reports), which are described below.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Download template: Both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use a template with a white background, black text, and a gray box (25%) that indicates when the download of the first dropper is started and completed.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_13_en-1024x923.png\" alt=\"Figure 13. Matches of the templates used by Grandoreiro and URSA\/Mispadu\" class=\"wp-image-859\" width=\"789\" height=\"711\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 13. Matches of the templates used by <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>File generation function: <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use the <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/html-smuggling\/\" data-type=\"URL\" data-id=\"https:\/\/www.imperva.com\/learn\/application-security\/html-smuggling\/\">HTML Smuggling<\/a> technique to generate and download the compressed file containing the first dropper. Within the source code of the automatic download site, numerous variables with pseudorandom letters that vary between uppercase and lowercase letters and numbers are observed. There is also a base64 string that corresponds to the ZIP with the HTA script inside, followed by the final name of the artifact and the different conditions to point the user to when the download is started and completed.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en\/wp-content\/uploads\/sites\/2\/2024\/12\/figura_14_en-1024x772.jpg\" alt=\"Figure 14. Matches between the source code of the Grandoreiro automatic download site and URSA\/Mispadu\" class=\"wp-image-879\" width=\"622\" height=\"469\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 14. Matches between the source code of the <em>Grandoreiro<\/em> automatic download site and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Archive typography: Both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use distinctive typography to name their artifacts. They use double-stroke letters from the Unicode block known as <a href=\"https:\/\/www.unicode.org\/charts\/PDF\/U1D400.pdf\" data-type=\"URL\" data-id=\"https:\/\/www.unicode.org\/charts\/PDF\/U1D400.pdf\">Mathematical Alphanumeric Symbols<\/a>; they also use the special Unicode character known as the decorative asterisk \u201c\u2749\u201d, and employ pseudo-random numbering from the Unicode block for <a href=\"https:\/\/www.unicode.org\/charts\/PDF\/U4E00.pdf\" data-type=\"URL\" data-id=\"https:\/\/www.unicode.org\/charts\/PDF\/U4E00.pdf\">CJK Unified Ideographs<\/a>.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\" \/>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_15_en-1024x345.png\" alt=\"Figure 15. Typography similarities of Grandoreiro and URSA\/Mispadu\" class=\"wp-image-861\" width=\"656\" height=\"221\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 15. Typography similarities of <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>First dropper written in HTA format: <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use scripts written in HTA as the initial dropper to download and execute a second dropper written in JavaScript.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_16_en-1024x271.png\" alt=\"Figure 16. Matches in the table content of the first dropper from Grandoreiro and URSA\/Mispadu\" class=\"wp-image-862\" width=\"806\" height=\"213\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 16. Matches in the table content of the first dropper from <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_17_en-1024x567.png\" alt=\"Figure 17. Matches in the code of the first dropper of Grandoreiro and URSA\/Mispadu\" class=\"wp-image-863\" width=\"762\" height=\"422\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 17. Matches in the code of the first dropper of <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Password validator: Both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use a password validator (commonly a password) to continue their infection chains.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_18_en-1024x288.png\" alt=\"Figure 18. Matches in the password validator of Grandoreiro and URSA\/Mispadu\" class=\"wp-image-864\" width=\"722\" height=\"203\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 18. Matches in the password validator of <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Second dropper written in JS: both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use a JavaScript script to download additional artifacts written in VBS, install them in the %PUBLIC% directory, and execute them. It is important to note that while the files downloaded by this dropper are written in the same language, in this case the code is different. However, their purpose remains the same: to continue the infection chain.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_19_en-1024x429.png\" alt=\"Figure 19. Matches in the code of the second dropper of Grandoreiro and URSA\/Mispadu\" class=\"wp-image-865\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 19. Matches in the code of the second dropper of <em>Grandoreiro<\/em> and <em>URSA\/Mispad<\/em><\/strong><em>u<\/em><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_20_en-1024x487.png\" alt=\"Figure 20. Matches in the installation of the third dropper of Grandoreiro and URSA\/Mispadu\" class=\"wp-image-866\" width=\"803\" height=\"382\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 20. Matches in the installation of the third dropper of <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Suspended account template: Both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use a template on their command-and-control, and malware download servers that warn of a supposed suspended account. SCILabs has already identified this as one more defense evasion mechanism used by malware operators to divert analysts&#8217; attention and avoid further analysis.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_21_en-1024x302.png\" alt=\"Figure 21. Matches in the suspended account template on Grandoreiro and URSA\/Mispadu download and C2 servers\" class=\"wp-image-867\" width=\"889\" height=\"262\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 21. Matches in the suspended account template on <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> download and C2 servers<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use of subdirectories with particular names: Both <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> use subdirectories composed of one or two letters, for example, \/v, \/fw, among others, on their command and control and malware storage servers, where it was possible to identify malicious artifacts related to the analyzed campaigns.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_22_en-1024x506.png\" alt=\"Figure 22. Similarities in the Grandoreiro and URSA\/Mispadu subdirectories\" class=\"wp-image-868\" width=\"856\" height=\"423\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 22. Similarities in the <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> subdirectories<\/strong><\/p>\n\n\n\n<p>After reviewing the evidence available at the moment, SCILabs has the hypothesis (with a medium level of confidence) that the campaigns mentioned in the overlap analysis are related to each other or belong to the same threat actor; however, without a greater amount of evidence, this relationship will be classified as an operation, named by SCILabs as <em>Operation Saci<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary of the attack flow observed in <em>Operation Saci<\/em><\/strong><\/h2>\n\n\n\n<p>Below is the flow diagram of the malware attack used by <em>Operation Saci<\/em>.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The user receives a phishing email using pretexts related to pending payment receipts, invoices, or vouchers.<\/li><li>The email contains a password-protected PDF file with a hyperlink embedded in it.<\/li><li>If the user clicks on the hyperlink, they are redirected to a site that automatically downloads a compressed file in ZIP format.<\/li><li>If the user decompresses the file, they obtain a file in HTA format, which serves as the first malware dropper.<\/li><li>If the user executes the HTA, the malicious banking Trojan activity described below begins:<\/li><li>It deploys a password validator.<\/li><li>If the user solves it successfully, it leads to the next malware stage.<\/li><li>Executes a script in JS format that is responsible for launching a dropper in VBS format.<\/li><li>The Trojan generates persistence within the Windows registry keys in <em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>.<\/li><li>A second dropper written in VBS is installed in the <em>%PUBLIC% <\/em>directory to download the following malware stages.<ul><li>In the case of <em>Grandoreiro<\/em>, it downloads a ZIP-compressed file containing a &nbsp;legitimate executable and a malicious DLL, which is loaded into memory using the DLL-Hijacking technique and serves as the <em>Grandoreiro<\/em> payload.<\/li><\/ul><ul><li>In the case of <em>URSA\/Mispadu<\/em>, it uses an AutoIt Script to steal SMTP credentials as well as Google Chrome and Microsoft Edge history. If the environment is optimal for URSA\/Mispadu, the malware is loaded into memory using a legitimate AutoIt executable along with a malicious AutoIt script.<\/li><li>The information from the victim&#8217;s computer is shared with its command-and-control server.<\/li><\/ul><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Flowchart of <em>Operation Saci<\/em><\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/figura_23_en-1024x859.png\" alt=\"Figure 23. General flow diagram of an Operation Saci attack identified in this campaign\" class=\"wp-image-869\" width=\"920\" height=\"772\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Figure 23. General flow diagram of an <em>Operation Saci<\/em> attack identified in this campaign<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Observed TTPs aligned to the MITRE ATT&amp;CK\u00ae framework<\/strong><\/h2>\n\n\n\n<p>The following MITRE ATT&amp;CK\u00ae Matrix was observed by SCILabs during the analysis of <em>Operation Saci<\/em>.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.scilabs.mx\/en2\/wp-content\/uploads\/sites\/3\/2024\/11\/mitre-1024x655.png\" alt=\"Table 2. Observed TTPs aligned to the MITER ATT&amp;CK\u00ae framework\" class=\"wp-image-872\" width=\"927\" height=\"593\" \/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-center has-vivid-cyan-blue-color has-text-color\"><strong>Table 2. Observed TTPs aligned to the MITRE ATT&amp;CK\u00ae framework<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Assessment<\/strong><\/h1>\n\n\n\n<p>In recent months, SCILabs observed multiple overlaps between the infection chains of different families of banking Trojans like <em>Operation <a href=\"http:\/\/peracion-observada-en-agosto-2024\/\" data-type=\"URL\" data-id=\"peracion-observada-en-agosto-2024\/\">Gecko Assault<\/a><\/em>, which randomly distributes <em>URSA\/Mispadu<\/em> and Mekotio, as well as the more recent <em>Operation Saci<\/em>. Knowing the threat landscape that affects Latin America can help organizations improve their security posture, accurately knowing the TTPs and modus operandi of malware operators.<\/p>\n\n\n\n<p>The main danger of <em>Operation Saci<\/em> lies in the families of the banking Trojans it uses. <em>URSA\/Mispadu<\/em> and <em>Grandoreiro<\/em> are two of the most persistent threats in LATAM. They usually attack multiple countries simultaneously and continually modify their TTPs.<\/p>\n\n\n\n<p>Based on the analysis of <em>Operation Saci\u2019s <\/em>infrastructure conducted by SCILabs, it is likely to remain active throughout the rest of 2024 and expand its geographical reach: evidence of successful infections has already been observed in Argentina and Brazil.<\/p>\n\n\n\n<p>The potential victims of banking Trojans such as <em>Grandoreiro<\/em> and <em>URSA\/Mispadu<\/em> are all types of users who do not know the social engineering techniques, or the pretexts used by the operators of this malware in their massive phishing email campaigns.<\/p>\n\n\n\n<p>For these reasons, SCILabs considers important for institutions and companies to keep updated about the pretexts and indicators of compromise of these campaigns to minimize the risk of infection and the impact that the theft of banking information can have on organizations.<\/p>\n\n\n\n<p><strong>General recommendations<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Block the IoCs provided in this report.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Conduct awareness campaigns about social engineering techniques used by cybercriminals to distribute malware, such as phishing emails using pretexts related to invoices.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Avoid having RDP services exposed to the Internet and implement Multiple Factor Authentication solutions to minimize the risk of cybercriminals using your infrastructure as a malware repository.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Raise user awareness to discourage storing access credentials in web browsers and inform them about the associated risks.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify suspicious Windows registry entries in the path <em>HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run<\/em>.<\/li><\/ul>\n\n\n\n<p><strong>Recommendations related to <em>Grandoreiro<\/em><\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform threat hunting activities on your EndPoints looking for directories with suspicious names within the paths associated with this banking Trojan, for example:<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><em>C:\\&lt;9 random characters&gt;<\/em><\/li><li><em>C:\\Users\\&lt;USER&gt;\\AppData\\Local\\Temp<\/em><\/li><li><em>C:\\Users\\&lt;USER&gt;\\AppData\\Roaming<\/em><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform threat-hunting activities on EndPoint processes to identify executions of apparently legitimate processes such as javaw.exe, java.exe, cmd.exe, conhost.exe, more.exe, and chcp.exe that are not part of the operation.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform threat-hunting activities on EndPoint processes to identify suspicious FlashFXP and Beyond Compare process executions with names other than the original, for example, RIPPOi.exe and ULTRAPCKJ.exe.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Monitor suspicious traffic to geolocation web services such as IP-API[.]COM to identify possible malware compromises. <em>Grandoreiro<\/em> uses these types of domains during the infection chain.<\/li><\/ul>\n\n\n\n<p><strong>Recommendations related to <em>URSA\/Mispadu<\/em><\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Consider blocking AutoIt on all EndPoints within the organization, as it is utilized by <em>URSA\/Mispadu<\/em> and other banking Trojans.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify AutoIt v3 Script executions.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform threat hunting by searching for suspicious files within <em>%APPDATA%,<\/em> mainly with EXE, AU3 or PNG extensions.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Perform threat hunting by looking for the creation of suspicious shortcuts within <em>%APPDATA%\\Microsoft\\Windows\\StartMenu\\Programs\\Startup<\/em>, mainly with the name AudioDriver.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify SQLite-type files in the <em>%LOCALAPPDATA%\\Temp<\/em> directory, which may contain sensitive information from the victim&#8217;s web browser.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>Identify the SQLite3.dll file in the <em>%LOCALAPPDATA%\\Temp<\/em> directory used in some campaigns by <em>URSA\/Mispadu<\/em>.<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Indicators of compromise<\/strong><\/h1>\n\n\n\n<p>Below are the Indicators of Compromise identified in the analysis conducted by SCILabs, provided with a HIGH level of confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hashes SHA256<\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <strong><\/strong><\/h2>\n\n\n\n<p>E418F21E8D2DD33DFE16A1BE01C39C356B6DEAC9308BC4F415E3062537D6A814&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>14060B79FC2D0DA2B77832C6C4C884A6C16582BC990F3658DC22661911BFC3A3&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>9A96C9BF51C751B5982219088B78BE606A9DDFCBDCAEB7889360D3CAAA833016&nbsp;&nbsp;<\/p>\n\n\n\n<p>4CF99CB330E585065C1807018846FF0DF1E578B8C6CEEE121C7C3B0F1221C762&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>C1351BC6F191E5F4E04480A0A873144EFBDB81721D1EC5DB37C9C9D8BDC353D1&nbsp;&nbsp;<\/p>\n\n\n\n<p>99D033C3A625A711D296B70DD178F52A9D28FA670871E2F392AFEF19E9E7D056&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>3CEB3738C05D6F12443A46C38F6A046658C9F876F2CCEA063234018915EB6FD0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>27438884CC83C90A1C5690BC350FE5BB95F8DB35B3E436096B89CD67A8ECA182&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>23D290AF8A6C39D4E6749D42EDE056EE318480FAC89BB53EE3B31435C6F82A46&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>88F2533C9F16277F0895EF41CC3AAA7EEDEE88D1503A064DEC2E5473C76561AD&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>E2C76D4D639337EA98EE80E3F2E83111D25BB8ACBB017F0F54019B823459FDEE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>BC49697F846F6EBD79D7156084056B3330729D783268D7E0732A7E4134CABEA9&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>2784544927037CC35441D5DEF3B024993CD17DEFC7D8A737881D8A3EC129896C&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>87045CD2D94D3C4280B870652ABA5B8C864CAF20CE340598DA33CE919D39251A&nbsp;&nbsp;<\/p>\n\n\n\n<p>19D2416D99A77FEFF348EC102A87649DB2302FF16A42343F33FA34024837D7B1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>0BA03E61E311B64C2886CD33FC438BA7CF8B5AC185FE9226EF668C262CF73EC7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>C11C1C02DBA7C5BEB80ECEDB6A9518308D532850551316D32F786C2AD8315D24<\/p>\n\n\n\n<p>0D44DC8EE5CDF32D498C43F36BD08623B354F8F3ACA2A4B6ADC085963DC0A364<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Malware download sites<\/strong><\/h2>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><em>It is recommended to block the entire URL in order to avoid future false positives or operation failures.<\/em><\/p>\n\n\n\n<p>hxxps:\/\/stomxfct[.]com\/con\/yPOXE2\/RXb7941[.]js<\/p>\n\n\n\n<p>hxxps:\/\/adjunto[.]pdfxml[.]store\/\/6725608180da8\/6725608180eb7[.]vbs<\/p>\n\n\n\n<p>hxxp:\/\/62[.]113[.]116[.]63\/mx01\/cancun01[.]zip<\/p>\n\n\n\n<p>hxxps:\/\/comprobantcdif.blogspot.com<\/p>\n\n\n\n<p>hxxps[:]\/\/carecenterhq[.]com\/isuIVXBREGa\/JJ2\/BpxAu9\/<\/p>\n\n\n\n<p>hxxps[:]\/\/carecenterhq[.]com\/isuIVXBREGa\/<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>C2 Servers<\/strong><\/h2>\n\n\n\n<p class=\"has-vivid-red-color has-text-color\"><em>It is recommended to block the entire URL in order to avoid future false positives or operation failures.<\/em><\/p>\n\n\n\n<p>hxxps:\/\/stomxfct[.]com\/con\/v<\/p>\n\n\n\n<p>hxxps:\/\/stomxfct[.]com\/<\/p>\n\n\n\n<p>hxxp:\/\/62[.]113[.]116[.]63\/mx01\/<\/p>\n\n\n\n<p>hxxp:\/\/62[.]113[.]116[.]63\/v<\/p>\n\n\n\n<p>hxxp:\/\/62[.]113[.]116[.]63\/conta[.]mx\/index[.]php<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The following report aims to provide indicators of compromise, along with the technical tactics and procedures associated with a<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[8,14,15,16],"class_list":["post-838","post","type-post","status-publish","format-standard","hentry","category-malware","category-operation","tag-banker","tag-latam","tag-malware","tag-operation"],"_links":{"self":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/comments?post=838"}],"version-history":[{"count":0,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/posts\/838\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/media?parent=838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/categories?post=838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.scilabs.mx\/en\/wp-json\/wp\/v2\/tags?post=838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}