Tracking rapid evolution? Copycat? Of an APT RAT in Asia

Hiroshi Takeuchi (Macnica Networks)
partner message

Questions? Comments? Join the chat on Discord now!

Go to the Chat page

Submit your questions for VB2020 speakers on the #q-and-a channel,

chat with your peers on #general-chat, say hi to our our partners on their channels,

and enjoy the bustle of the conference corridor.

partner message

ANY.RUN - Interactive malware analysis sandbox

http://any.run/

Get fast results in real-time! Intuitive interface. Convenient for any level analysts.

Join for free and start your malware hunting!

partner message

Avira Cloud Sandbox API. Completely private, unlimited-scale, automated malware analysis service

https://oem.avira.com/en/solutions/cloud-sandbox-api

Avira’s Cloud Sandbox API is built to ensure data privacy.

Receive detailed, file-specific threat intelligence reports containing actionable intelligence.

Supports MITRE ATT&CK™ framework.

partner message

Do APT Mercenary Groups Pose Real Threat to Companies?

https://businessresources.bitdefender.com/apt-as-a-service-webinar

Learn about the recent Bitdefender investigation of a new attack attributed to a sophisticated actor offering advanced-persistent-threats-as-a-service.

Access the investigation

partner message

Be a part of the cyber resilience story - explore careers at

https://careers.opentext.com/

Join the cybersecurity and data protection team at Carbonite + Webroot, OpenText companies.

partner message

We don’t just talk about sharing. We do it every day

https://www.cyberthreatalliance.org/our-sharing-model/

Find out more about how threat intelligence sharing and collaboration through the Cyber Threat Alliance can function as a force multiplier to improve defenses across the ecosystem.

partner message

Map Malicious Infrastructures with Pure Signal™ Intelligence

https://partners.team-cymru.com/pure-signal-trial

Elite analyst teams use Team Cymru’s Pure Signal platform to access 50+ data types, including global network flow, PDNS, malware and more.

Start your 2-week trial now!

partner message

What is cyber threat intelligence (CTI) and how is it used?

Join the VB2020 Threat Intelligence Practitioners’ Summit (TIPS)

Join the VB2020 Threat Intelligence Practitioners’ Summit, sponsored by the Cyber Threat Alliance,

to hear from leading industry voices on how CTI sharing can function as a force multiplier to strengthen defenses across the ecosystem.

partner message

Kaspersky Threat Intelligence Portal - find cyberthreats in files, URLs, IPs and domains

https://opentip.kaspersky.com/

Know which alerts or incidents pose real threats, and prioritize them fast and effectively based on impact and risk levels.

partner message

No-Cost Threat Detection for ISPs and Hosting Providers

https://partners.team-cymru.com/nimbus-threat-monitor

Partner with Team Cymru and get near-real-time threat detection, powered by our world-class IP Reputation data.

Join us now!

partner message

Outsource your Unwanted Software/PUA Work for Free

https://appesteem.com/avs

AppEsteem’s feeds sort out the good apps from the Deceptors.

Our criteria are widely accepted. We’ll help with your disputes.

All for Free. Giving you more time to fight real malware.

partner message

Do you want to know how IT security products score in independent tests?

https://www.av-comparatives.org/enterprise/latest-tests/

AV-Comparatives is an ISO certified independent organization offering systematic testing that checks whether security software lives up to its promises.

Results are available for free!

partner message

Defeating Application Fraud - Learn How

https://www.shapesecurity.com/solutions

We protect more accounts from fraud than everyone else in the world combined.

Shape Security is now part of F5 (www.f5.com)

partner message

30+ years of experience in the anti-malware industry

www.virusbulletin.com

Virus Bulletin is so much more than just a great conference.

Check out our website to see what more we have to offer.

partner message

DNSDB®: The DNS Super Power for Security Teams

https://www.farsightsecurity.com/get-started-guide/

Farsight Security DNSDB®: the world's largest real-time and historical database of DNS resolutions.

Get your free DNSDB API key and use it in our newly updated web GUI, DNSDB Scout and your own environments.

Contextualize everything DNS related with one API key - DNSDB.

RATs originate from many sources: open-source tools or cybercriminal marketplaces and they are sometimes created bespoke by cyber espionage groups. One RAT, called 'LODEINFO', caught our research team’s attention. It was December 2019 when we first observed this RAT, which was delivered via a spear-phishing email. We shared our research of the RAT in an analysis paper published in May this year. At the time of writing the paper, we did not pay much attention to the RAT - its code was unknown, and we could not find any evidence of relationships with known threat actors. We thought this was a one-off piece of malware used in a cyber espionage case.

However, contrary to our expectations, LODEINFO has been used in many operations and still continues to be used. The threat actor using this RAT is very active and aggressively changing its TTPs including several new version releases in a very short timeframe (seven versions in six months!). Due to this, we started to track LODEINFO and found some interesting points. Until now this malware has only been found in Japan.

In the beginning of this presentation, we talk about target industries and TTP changes in delivery, initial compromise and infrastructure over the operations. The main attack vector is spear phishing and adding some tricks to surrogate security solutions, especially by sandbox. This is just one of several examples. After covering the threat actor’s overall TTPs, we will proceed to deep dive into LODEINFO. We will present the details of the LODEINFO workflow and implementations (anti-analysis, encryption, C&C protocol and features). Finally, we compare LODEINFO with the TTPs of known threat actors (DarkHotel and APT10) and present possible attribution theories and future prospects for the LODEINFO.
Hiroshi Takeuchi
Macnica Networks Hiroshi Takeuchi is an analyst and member of the Security Research Center at Macnica Networks. He has been working in the security domain for over seven years. His main responsibilities are analysing malware, in particular that used in targeted attacks, and collecting threat intelligence. He has developed internal tools such as an intelligence platform, honey network, and python scripts to support analysis. He writes blog posts, publishes reports and has spoken at a number of security conferences including CONFidence, HITCON and JSAC (Japan Security Analyst Conference) to share his research.
arrow left Back

Tracking rapid evolution? Copycat? Of an APT RAT in Asia

Hiroshi Takeuchi (Macnica Networks)
RATs originate from many sources: open-source tools or cybercriminal marketplaces and they are sometimes created bespoke by cyber espionage groups. One RAT, called 'LODEINFO', caught our research team’s attention. It was December 2019 when we first observed this RAT, which was delivered via a spear-phishing email. We shared our research of the RAT in an analysis paper published in May this year. At the time of writing the paper, we did not pay much attention to the RAT - its code was unknown, and we could not find any evidence of relationships with known threat actors. We thought this was a one-off piece of malware used in a cyber espionage case.

However, contrary to our expectations, LODEINFO has been used in many operations and still continues to be used. The threat actor using this RAT is very active and aggressively changing its TTPs including several new version releases in a very short timeframe (seven versions in six months!). Due to this, we started to track LODEINFO and found some interesting points. Until now this malware has only been found in Japan.

In the beginning of this presentation, we talk about target industries and TTP changes in delivery, initial compromise and infrastructure over the operations. The main attack vector is spear phishing and adding some tricks to surrogate security solutions, especially by sandbox. This is just one of several examples. After covering the threat actor’s overall TTPs, we will proceed to deep dive into LODEINFO. We will present the details of the LODEINFO workflow and implementations (anti-analysis, encryption, C&C protocol and features). Finally, we compare LODEINFO with the TTPs of known threat actors (DarkHotel and APT10) and present possible attribution theories and future prospects for the LODEINFO.
Hiroshi Takeuchi
Macnica Networks Hiroshi Takeuchi is an analyst and member of the Security Research Center at Macnica Networks. He has been working in the security domain for over seven years. His main responsibilities are analysing malware, in particular that used in targeted attacks, and collecting threat intelligence. He has developed internal tools such as an intelligence platform, honey network, and python scripts to support analysis. He writes blog posts, publishes reports and has spoken at a number of security conferences including CONFidence, HITCON and JSAC (Japan Security Analyst Conference) to share his research.