Analysis

MyloBot, first detected in 2018, is known to feature an array of sophisticated anti-debugging capabilities and propagation techniques to rope infected machines into a botnet, not to mention remove traces of other competing malware from the systems.

Chief among its methods to evade detection and stay under the radar included a delay of 14 days before accessing its command-and-control servers and the facility to execute malicious binaries directly from memory. MyloBot also leverages a technique called process hollowing, wherein the attack code is injected into a suspended and hollowed process in order to circumvent process-based defenses. This is achieved by unmapping the memory allocated to the live process and replacing it with the arbitrary code to be executed, in this case a decoded resource file.

“The second stage executable then creates a new folder under C:\ProgramData,”. “It looks for svchost.exe under a system directory and executes it in suspended state. Using an APC injection technique, it injects itself into the spawned svchost.exe process.”

The next phase of the infection involves establishing persistence on the compromised host, using the foothold as a stepping stone to establish communications with a remote server to fetch and execute a payload that, in turn, decodes and runs the final-stage malware.

This malware is designed to abuse the endpoint to send extortion messages alluding to the recipients’ online behaviors, such as visiting porn sites, and threatening to leak a video that was allegedly recorded by breaking into their computers’ webcam.

Effected Locations

Country Number of IPs
Iraq 3,014
Iran 2,788
Argentina 2,602
Russia 1,919
Vietnam 1,786
China 1,202
India 926
Saudi Arabia 914
Chile 844
Egypt 798

 Mitigation

  1. Avoid clicking links in advertisements
  2. Use trusted antivirus software with anti-spyware features.
  3. Quarantining suspicious emails.
  4. Get your password security under control (Eg.2FA).
  5. Don’t click on online pop-ups.
  6. Try to avoid installation of third-party software’s.
  7. Keep software patched and updated.

 IOCs

C2 IP Port FQDN Number of IPs
74.222.19.103 7432 m20.fywkuzp.ru 2,675
74.222.19.63 7432 m19.fywkuzp.ru 2,511
217.23.13.62 7432 m7.fywkuzp.ru 2,420
89.39.107.19 7432 m12.fywkuzp.ru 2,289
70.36.107.38 7432 m21.fywkuzp.ru 2,259
89.39.105.82 7432 m8.fywkuzp.ru 2,133
89.38.98.48 7432 m10.fywkuzp.ru 2,128
109.236.85.147 7432 m25.fywkuzp.ru 2,108
217.23.6.62 7432 m11.fywkuzp.ru 2,082
89.38.98.165 7432 m6.fywkuzp.ru 1,632
109.236.85.21 7432 m4.fywkuzp.ru 1,532
217.23.3.15 7432 m13.fywkuzp.ru 1,119
109.236.85.150 7432 m1.fywkuzp.ru 986
109.236.85.154 7432 m5.fywkuzp.ru 971
46.166.173.180 7432 m24.fywkuzp.ru 943
109.236.85.153 7432 m3.fywkuzp.ru 917
109.236.85.135 7432 m2.fywkuzp.ru 840
109.236.87.49 7432 m9.fywkuzp.ru 683
70.36.107.39 7432 m22.fywkuzp.ru 666
75.126.102.251 9529 m9.qjwhpfe.net 344
109.236.85.93 7432 m26.fywkuzp.ru 184
70.36.107.154 7432 m0.fywkuzp.ru 135

 Reference

 

  1. https://thehackernews.com/2022/02/new-mylobot-malware-variant-sends.html