Home » News » Password-stealing malware LokiBot started hiding its code in pictures

Password-stealing malware LokiBot started hiding its code in pictures

The famous LokiBot malware now uses steganography as an extra layer of obfuscation.

Researchers at Trend Micro have recorded a new variant of the malware and conducted its analysis. Apparently, the authors are now actively finalizing and improving LokiBot.

“Our analysis of a new LokiBot variant shows that it has improved its capabilities for staying undetected within a system via an updated persistence mechanism and the use of steganography to hide its code”, — reported Trend Micro researchers.

A malicious program has been adopted by some cybercriminal groups, including Nigerian attackers SilverTerrier.

Read also: The new version of the banking Trojan TrickBot “kicks off” Windows Defender

LokiBot can steal information from 25 different browsers, check the availability of tools for remote administration (SSH, VNC, RDP), and retrieve credentials from email clients.

In the latest versions of malware, the authors taught him to hide code in images.

“One characteristic of the image file that we found interesting is that it can actually be opened as an image. However, it also contains data that LokiBot references in its unpacking routine”, — explained Trend Micro specialists.

Lokibot steganography
Lokibot steganography

This code is used at one stage of the attack to unpack. An analysis of experts showed that the image contains an encrypted binary, which the malware uses to decrypt LokiBot in the RAM of the infected device.

“One likely reason for this particular variant’s reliance on steganography is that it adds another layer of obfuscation — wscript (the VBS file interpreter) is used to execute the malware instead of the actual malware executing itself. Since the autostart mechanism uses a script, future variants can choose to”, — Trend Micro specialists write.

Researchers note that this approach, that LokiBot malware uses steganography, not only allows the malware to bypass detection, but also to become stronger in the attacked system.

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply