{"id":88380,"date":"2020-01-24T16:34:10","date_gmt":"2020-01-24T11:04:10","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=88380"},"modified":"2020-01-24T19:17:59","modified_gmt":"2020-01-24T13:47:59","slug":"new-wave-mal-spam-campaign-attaching-disk-imaging-files","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/new-wave-mal-spam-campaign-attaching-disk-imaging-files\/","title":{"rendered":"New wave of Mal-Spam campaign attaching Disk Imaging Files"},"content":{"rendered":"<p>From past few months at Quick-Heal Labs, we have been observing a sudden rise in Spear Phishing mail containing distinct file formats as attachment like IMG, ISO, etc. These new types of attachments are mainly used to deploy some well-known and older Remote Access Trojans. The subject of these emails are made to appear as genuine as possible in the form of \u2018Case file against your company\u2019 or \u2018AWB DHL SHIPMENT NOTICE AGAIN\u2019 etc. The attached files contain compressed malware (RAT\u2019s) which have many different names like \u2018Court Order.img\u2019, \u2018Product Order.img\u2019, etc. The below image displays one such spear phishing mail.<\/p>\n<figure id=\"attachment_88384\" aria-describedby=\"caption-attachment-88384\" style=\"width: 969px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88384 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Spam_Mail-2.png\" alt=\"\" width=\"969\" height=\"684\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spam_Mail-2.png 969w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spam_Mail-2-300x212.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spam_Mail-2-768x542.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spam_Mail-2-553x390.png 553w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spam_Mail-2-789x557.png 789w\" sizes=\"(max-width: 969px) 100vw, 969px\" \/><figcaption id=\"caption-attachment-88384\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 1: Spear phishing mail with malicious attachment of type IMG<\/em><\/figcaption><\/figure>\n<p>Below fig. shows that common compression file formats like RAR, ZIP and GZ are used most widely for spear phishing emails. We can also see that disk imaging file format like ISO and IMG are also being used for spear phishing and deployment of malware to some extent.<\/p>\n<figure id=\"attachment_88387\" aria-describedby=\"caption-attachment-88387\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88387 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Distribution-of-various-compressed-file-formats-in-Spear-Phishing-Emails.png\" alt=\"\" width=\"700\" height=\"450\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Distribution-of-various-compressed-file-formats-in-Spear-Phishing-Emails.png 700w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Distribution-of-various-compressed-file-formats-in-Spear-Phishing-Emails-300x193.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Distribution-of-various-compressed-file-formats-in-Spear-Phishing-Emails-607x390.png 607w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-88387\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 2: Distribution of various compressed file formats in Phishing Mails<\/em><\/figcaption><\/figure>\n<p>The below graph shows that the number of IMG and ISO files used to deploy RAT\u2019s is growing rapidly from November 2019. Before November 2019, the count of IMG and ISO files combined was negligible.<\/p>\n<figure id=\"attachment_88394\" aria-describedby=\"caption-attachment-88394\" style=\"width: 552px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88394 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Rise-of-IMG-and-ISO-Files-used-in-Spear-Phishing-Emails.png\" alt=\"\" width=\"552\" height=\"310\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Rise-of-IMG-and-ISO-Files-used-in-Spear-Phishing-Emails.png 552w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Rise-of-IMG-and-ISO-Files-used-in-Spear-Phishing-Emails-300x168.png 300w\" sizes=\"(max-width: 552px) 100vw, 552px\" \/><figcaption id=\"caption-attachment-88394\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 3: Rise of IMG and ISO Files used in Spear Phishing Emails<\/em><\/figcaption><\/figure>\n<p>On windows 8 and above, user can directly open these files like ISO, IMG in explorer by just double clicking it. For older versions of windows, users have to mount or extract these files and then use. This might be the reason for high amount of spear phishing emails using disk imaging format.<\/p>\n<p>The below image shows the widespread distribution of spear phishing emails over past 6 months, with .ISO and .IMG extension of attachment indicated with red dots in different countries.<\/p>\n<figure id=\"attachment_88393\" aria-describedby=\"caption-attachment-88393\" style=\"width: 1131px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88393 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails.png\" alt=\"\" width=\"1131\" height=\"473\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails.png 1131w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails-300x125.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails-768x321.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails-650x272.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Country-wise-distribution-of-attachment-types-used-in-Spear-Phishing-Mails-789x330.png 789w\" sizes=\"(max-width: 1131px) 100vw, 1131px\" \/><figcaption id=\"caption-attachment-88393\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 4: Country wise distribution of attachment types used in Spear Phishing Mails.<\/em><\/figcaption><\/figure>\n<p>We specifically observed Nanobot, Remcos and Lokibot spreading through use of disk imaging formats. These malware are observed all over the globe with Nanobot having the highest hits for spear phishing mails.<\/p>\n<figure id=\"attachment_88392\" aria-describedby=\"caption-attachment-88392\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88392 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Comparison-of-Number-of-Spear-Phishing-attempts.png\" alt=\"\" width=\"700\" height=\"450\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Comparison-of-Number-of-Spear-Phishing-attempts.png 700w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Comparison-of-Number-of-Spear-Phishing-attempts-300x193.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Comparison-of-Number-of-Spear-Phishing-attempts-607x390.png 607w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-88392\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 5: Comparison of Number of Spear Phishing attempts<\/em><\/figcaption><\/figure>\n<p style=\"text-align: left;\"><strong>Infection Chain:<\/strong><\/p>\n<figure id=\"attachment_88417\" aria-describedby=\"caption-attachment-88417\" style=\"width: 1080px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88417 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Infection_Chain-1.gif\" alt=\"\" width=\"1080\" height=\"608\" \/><figcaption id=\"caption-attachment-88417\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 6: Flow of Infection<\/em><\/figcaption><\/figure>\n<p>Now let\u2019s see each of these one by one i.e.Nanobot, Lokibot and Remcos. As these malware are widespread and already known, we will only take a short look into them.<\/p>\n<p><strong>Nanobot: <\/strong><\/p>\n<p>The attached iso or img file contains a windows executable file which works as a loader for nanobot, remcos or lokibot. Below fig shows mounted ISO image with just double click on attachment.<\/p>\n<figure id=\"attachment_88391\" aria-describedby=\"caption-attachment-88391\" style=\"width: 1045px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88391 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file.png\" alt=\"\" width=\"1045\" height=\"83\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file.png 1045w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file-300x24.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file-768x61.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file-650x52.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mounted-ISO-file-789x63.png 789w\" sizes=\"(max-width: 1045px) 100vw, 1045px\" \/><figcaption id=\"caption-attachment-88391\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 7: Mounted ISO file.<\/em><\/figcaption><\/figure>\n<p>This executable is a compiled AUTOIT script. It creates a new Process \u2018Regasm.exe\u2019 and injects the main payload into it. The injected payload is a .Net executable file obfuscated with eazfuscator, and turns out to be a Nanocore client.<\/p>\n<figure id=\"attachment_88390\" aria-describedby=\"caption-attachment-88390\" style=\"width: 727px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88390 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Spawned-Regasm.png\" alt=\"\" width=\"727\" height=\"26\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-Regasm.png 727w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-Regasm-300x11.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-Regasm-650x23.png 650w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><figcaption id=\"caption-attachment-88390\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 8: Spawned Regasm.exe<\/em><\/figcaption><\/figure>\n<p>This particular sample that we analyzed is of Nanocore client of version 1.2.2.0 as shown in below fig.<\/p>\n<figure id=\"attachment_88389\" aria-describedby=\"caption-attachment-88389\" style=\"width: 253px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88389 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Nanocore-Client.png\" alt=\"\" width=\"253\" height=\"103\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Client.png 253w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Client-250x103.png 250w\" sizes=\"(max-width: 253px) 100vw, 253px\" \/><figcaption id=\"caption-attachment-88389\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 9: Nanocore Client<\/em><\/figcaption><\/figure>\n<p>Nanocore client\u2019s configuration and plugins are encrypted and present in the resources. At run-time it decrypts its configuration which contains multiple configurable options like Keyboard Logging, which can be set to true or false, bypassing UAC control, Run On Startup and various other configurable options for CNC communication.<\/p>\n<figure id=\"attachment_88401\" aria-describedby=\"caption-attachment-88401\" style=\"width: 585px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88401\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration-300x114.png\" alt=\"\" width=\"585\" height=\"222\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration-300x114.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration-768x293.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration-650x248.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration-789x301.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Nanocore-Configuration.png 1077w\" sizes=\"(max-width: 585px) 100vw, 585px\" \/><figcaption id=\"caption-attachment-88401\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 10: Nanocore Configuration<\/em><\/figcaption><\/figure>\n<p>Capabilities of NanoCore:<\/p>\n<ul>\n<li>Keyboard Logging<\/li>\n<li>Bypass UAC<\/li>\n<li>Multiple Plugins e.g:\n<ul>\n<li>Surveillance Plugin: Microphone and Webcam access.<\/li>\n<li>Management Plugin: Remote Console, Registry Editor etc.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Remcos:<\/strong><\/p>\n<p>The process for dropping Remcos is similar to that of Nanobot in above case. This executable is also a compiled AUTOIT Script, which creates \u2018RegSvcs.exe\u2019 and injects a PE into it which is Remcos RAT.<\/p>\n<figure id=\"attachment_88400\" aria-describedby=\"caption-attachment-88400\" style=\"width: 692px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88400 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Spawned-RegSvcs.exe_.png\" alt=\"\" width=\"692\" height=\"29\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-RegSvcs.exe_.png 692w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-RegSvcs.exe_-300x13.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Spawned-RegSvcs.exe_-650x27.png 650w\" sizes=\"(max-width: 692px) 100vw, 692px\" \/><figcaption id=\"caption-attachment-88400\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 11: Spawned RegSvcs.exe<\/em><\/figcaption><\/figure>\n<p>It makes use of mutex to confirm only one instance of malware running on infected system. Below image shows name of malware used as part of mutex name.<\/p>\n<figure id=\"attachment_88399\" aria-describedby=\"caption-attachment-88399\" style=\"width: 496px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88399 \" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Mutex-Creation.png\" alt=\"\" width=\"496\" height=\"72\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-Creation.png 496w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-Creation-300x44.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><figcaption id=\"caption-attachment-88399\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Figure 12: Mutex Creation<\/em><\/figcaption><\/figure>\n<p>Remcos decrypts it\u2019s settings from resource \u2018SETTING\u2019 present in its binary which is encrypted using RC4 algorithm.<\/p>\n<figure id=\"attachment_88398\" aria-describedby=\"caption-attachment-88398\" style=\"width: 505px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88398 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Reading-of-\u2018SETTINGS\u2019-Resource.png\" alt=\"\" width=\"505\" height=\"265\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Reading-of-\u2018SETTINGS\u2019-Resource.png 505w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Reading-of-\u2018SETTINGS\u2019-Resource-300x157.png 300w\" sizes=\"(max-width: 505px) 100vw, 505px\" \/><figcaption id=\"caption-attachment-88398\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 13: Reading of \u2018SETTINGS\u2019 Resource<\/em><\/figcaption><\/figure>\n<p>After decryption of loaded resource called \u2018SETTINGS\u2019, below settings are generated for Remcos.<\/p>\n<figure id=\"attachment_88397\" aria-describedby=\"caption-attachment-88397\" style=\"width: 444px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88397 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Decrypted-Resource-Settings.png\" alt=\"\" width=\"444\" height=\"305\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Decrypted-Resource-Settings.png 444w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Decrypted-Resource-Settings-300x206.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Decrypted-Resource-Settings-229x158.png 229w\" sizes=\"(max-width: 444px) 100vw, 444px\" \/><figcaption id=\"caption-attachment-88397\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 14: Decrypted Resource Settings<\/em><\/figcaption><\/figure>\n<p>Capabilities of Remcos:<\/p>\n<ul>\n<li>Key-logging<\/li>\n<li>Get system clipboard data<\/li>\n<li>Voice Recording<\/li>\n<li>Enable Camera<\/li>\n<\/ul>\n<p><strong>Lokibot:<\/strong><\/p>\n<p>This is somewhat different from the above two, as it drops a Visual Basic Native Compiled executable which is a variant of Lokibot RAT.<\/p>\n<p>The Lokibot malware reads registry key at present at: \u2018HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\MachineGuid\u2019 and computes its md5 hash using cryptography functions provided in advapi32.dll, which is used for creating a mutex. This mutex is used to check if system is already infected or not.<\/p>\n<figure id=\"attachment_88396\" aria-describedby=\"caption-attachment-88396\" style=\"width: 794px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88396 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot.png\" alt=\"\" width=\"794\" height=\"104\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot.png 794w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot-300x39.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot-768x101.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot-650x85.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Mutex-of-Lokibot-789x103.png 789w\" sizes=\"(max-width: 794px) 100vw, 794px\" \/><figcaption id=\"caption-attachment-88396\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 15: Mutex of Lokibot<\/em><\/figcaption><\/figure>\n<p>\u2018MachineGuid\u2019 is generated at the time of system installation, which is somewhat unique to the system configuration. Further this md5 hash of \u2018MachineGuid\u2019 is also used for creating a folder in %appdata% and dropping a self-copy and hdb file. The dropped self-copy\u2019s names characters are from the md5 of \u2018MachineGuid\u2019 from characters 13 to 18, and folder name characters are from the md5 of \u2018MachineGuid\u2019 from characters 8 to 13. The hdb file generated is specific to lokibot which it uses for storing the hash of stolen data.<\/p>\n<figure id=\"attachment_88395\" aria-describedby=\"caption-attachment-88395\" style=\"width: 924px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-88395 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot.png\" alt=\"\" width=\"924\" height=\"179\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot.png 924w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot-768x149.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot-650x126.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/01\/Dropped-Files-by-Lokibot-789x153.png 789w\" sizes=\"(max-width: 924px) 100vw, 924px\" \/><figcaption id=\"caption-attachment-88395\" class=\"wp-caption-text\"><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Figure 16: Dropped Files by Lokibot<\/em><\/figcaption><\/figure>\n<p>Capabilities of Lokibot:<\/p>\n<ul>\n<li>Stealing Password from browsers like Firefox, Chrome, Opera etc.<\/li>\n<li>Stealing Configuration from browsers.<\/li>\n<li>Stealing Password from Microsoft Windows Credential Manager.<\/li>\n<\/ul>\n<p><strong>Indicators of Compromise:<\/strong><\/p>\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"260\">MD5<\/td>\n<td width=\"240\">Name<\/td>\n<td width=\"78\">Malware<\/td>\n<\/tr>\n<tr>\n<td width=\"260\">795B0F5D8425DB2BBA02A7663A74447A<\/td>\n<td width=\"240\">Purchase Order_raw_material_2019_20_05.iso<\/td>\n<td width=\"78\">Remcos Wrapper<\/td>\n<\/tr>\n<tr>\n<td width=\"260\">36E49FCD84AAFCC6F02238A304A40A09<\/td>\n<td width=\"240\">Purchase Order_raw_material_2.exe<\/td>\n<td width=\"78\">Remcos<\/td>\n<\/tr>\n<tr>\n<td width=\"260\">5BFF53521C7FB38970D09B7CD82DFCCB<\/td>\n<td width=\"240\">DHL.iso<\/td>\n<td width=\"78\">Nanocore Wrapper<\/td>\n<\/tr>\n<tr>\n<td width=\"260\">B7C30DB2287179BBA2D007EC615ABCE4<\/td>\n<td width=\"240\">New nao.exe<\/td>\n<td width=\"78\">Nanocore<\/td>\n<\/tr>\n<tr>\n<td width=\"260\">7129f51a9e66b98f0b240b62451da860<\/td>\n<td width=\"240\">nonfragilely6<\/td>\n<td width=\"78\">Lokibot<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Few interesting file names of attached files in email to watch out for:<\/p>\n<ul>\n<li>\u2018Income Tax Payment Receipt\u2019<\/li>\n<li>\u2018IncomeTax Online Challan\u2019<\/li>\n<li>\u2018Citi Bank Payment-Advice-PDF\u2019<\/li>\n<li>\u2018DHL SHIPMENT NOTIFICATION_PDF\u2019<\/li>\n<li>\u2018FedEx Parcel\u2019<\/li>\n<\/ul>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>With invent of new features in Windows, threat actors also keep finding ways to abuse those features. Here, we have seen this in how disk imaging formats are being used to deploy RAT\u2019s. In future, these formats may also be used to deploy other kinds of malware, as threat actors are adept at abusing the features present in Windows itself.<\/p>\n<p><strong>How to stay safe:<\/strong><\/p>\n<p>Spam mail has been one of the most common Infection Vectors for various kinds of malware. Many people fall in such trap of phishing mails as it is socially engineered by the threat actors.<\/p>\n<p>Quick Heal provides protection against these threats. Users should take the below steps as security measures.<\/p>\n<ul>\n<li>Turn on email protection of your antivirus product.<\/li>\n<li>Do not open any link in the email body sent by an unknown source.<\/li>\n<li>Do not download and open any attachments from an unknown source.<\/li>\n<\/ul>\n<p>Subject Matter Expert:<\/p>\n<p>Prakash Galande, Rahul Sharma, Akshay Gaikwad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From past few months at Quick-Heal Labs, we have been observing a sudden rise in Spear Phishing mail containing distinct file formats as attachment like IMG, ISO, etc. These new types of attachments are mainly used to deploy some well-known and older Remote Access Trojans. The subject of these emails are made to appear as [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":88472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,303,293],"tags":[],"class_list":["post-88380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-phishing","category-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88380"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=88380"}],"version-history":[{"count":31,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88380\/revisions"}],"predecessor-version":[{"id":88385,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/88380\/revisions\/88385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/88472"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=88380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=88380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=88380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}