{"id":428,"date":"2021-05-11T08:23:26","date_gmt":"2021-05-10T23:23:26","guid":{"rendered":"https:\/\/mal-eats.net\/?p=428"},"modified":"2021-05-11T12:08:02","modified_gmt":"2021-05-11T03:08:02","slug":"campo_new_attack_campaign_targeting_japan","status":"publish","type":"post","link":"https:\/\/mal-eats.net\/en\/2021\/05\/11\/campo_new_attack_campaign_targeting_japan\/","title":{"rendered":"Campo, a New Attack Campaign Targeting Japan"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Since around March 2021, campaigns in Japan using an infrastructure called campo\/openfield have been observed. This campaign has the potential to deliver subsequent malware depending on the infected organization, and some cases eventually could result in ransomware incidents overseas.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We keep tracking this attack campaign, and it started to be observed at least around October 2020 as far as we are aware. We anticipate that attackers will continue to be active in the future, and we are concerned that this could lead to serious impacts including ransomware encryption in the worst case. Therefore, in order to prepare for such threats, we will share in this blog the characteristics of campaigns for Japan and how to check for malware execution traces based on our research.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Update history<\/b><\/h2>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Date<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Details<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">2021\/5\/11<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Published this blog<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b>Observation cases of this campaign in Japan<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Reports of suspicious emails in Japan have been shared on social networking sites.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reports are shown below in chronological order.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2020\/10\/14<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1316163808319041536\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1316163808319041536<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/3\/10<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1369612781209591813\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1369612781209591813<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/3\/24<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1374526482890944515\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1374526482890944515<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/3\/31<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1377280535710494729\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1377280535710494729<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/4\/6<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1379240664362143744\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1379240664362143744<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/4\/7<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1379602541495738371\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1379602541495738371<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">2021\/4\/8<br \/>\n<\/span><a href=\"https:\/\/twitter.com\/bomccss\/status\/1379970130642235392\"><span style=\"font-weight: 400;\">https:\/\/twitter.com\/bomccss\/status\/1379970130642235392<\/span><\/a><\/p>\n<p>2021\/4\/9<br \/>\n<a href=\"https:\/\/twitter.com\/bomccss\/status\/1380327966765314050\">https:\/\/twitter.com\/bomccss\/status\/1380327966765314050<\/a><\/p>\n<h2><b>Big picture of attack campaign<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The big picture of the attack campaign is as shown in Figure1. The attack begins with incoming Japanese emails. The body of the email contains a URL link and a password, and when the user accesses the URL link, they can download a ZIP file with the password. After extracting this zip file and opening the document file to enable the content, a downloader called Campo Loader is dropped and executed, then starts communication. In addition, it infects DFDownloader as a follow-up malware which can download and execute additional payloads by communicating with the C2 server.<\/span><\/p>\n<figure id=\"attachment_390\" aria-describedby=\"caption-attachment-390\" style=\"width: 1215px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-390 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=640%2C231&#038;ssl=1\" alt=\"\" width=\"640\" height=\"231\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?w=1215&amp;ssl=1 1215w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=300%2C108&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=1024%2C370&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=768%2C277&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=700%2C253&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=520%2C188&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=360%2C130&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=250%2C90&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image28-1.png?resize=100%2C36&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-390\" class=\"wp-caption-text\">Figure1. The big picture of the attack campaign<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">We believe that the attacker is using an anti-bot service called &#8220;BlackTDS&#8221; to communicate with the both host of the URL link and the host of the Campo Loader. This service enables communications for research activities to redirect to unintentionally legitimate sites. Details of how this service works are described later.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DFDownloader used in this campaign against Japan has the ability to download and execute additional malware, but at this time we have not observed any following payloads yet. The DFDownloader has not yet been reported overseas. Hence, the final payload via DFDownloader is not known.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, similar cases of infection with the follow-up malware via Campo Loader have been reported overseas.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Trickbot<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Ursnif<\/span><\/li>\n<li><span style=\"font-weight: 400;\">BazarLoader -&gt; CobaltStrike, AnchorDNS<\/span><\/li>\n<li><span style=\"font-weight: 400;\">PhobosRansom<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We also believe that the attackers in past campaigns attempting to infect Zloader may have been the same attacker group. We will discuss these at the end of this paper.<\/span><\/p>\n<h2><b>Features of Emails<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">An example of emails is shown in Figure 2.\u00a0<\/span><span style=\"font-weight: 400;\">In the attack campaign for Japan, the email is written in Japanese. As for the content of the email, it pretends to be a real company representative and asks the user to download a ZIP file with a password linked to it in the form of an invoice. The email address is different from a legitimate corporate email address, and the attacker is pretending to be a corporation. We have confirmed that the passwords for the linked files in the email are all the same as far as we can currently observe. Furthermore, based on the email headers, we assume that the attacker is using Roundcube Webmail, an open source webmail, to deliver the message.<\/span><\/p>\n<figure id=\"attachment_330\" aria-describedby=\"caption-attachment-330\" style=\"width: 1089px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-330 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=640%2C316&#038;ssl=1\" alt=\"\" width=\"640\" height=\"316\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?w=1089&amp;ssl=1 1089w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=300%2C148&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=1024%2C505&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=768%2C379&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=700%2C345&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=520%2C256&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=360%2C178&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=250%2C123&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image2.png?resize=100%2C49&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-330\" class=\"wp-caption-text\">Figure2. Email samples in Japanese<\/figcaption><\/figure>\n<h2><b>Features of the linked server<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We have confirmed that all the linked URLs where the passworded ZIPs are located have https. It also has the following features. The IP address associated with the domain name is often common.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result of our investigation, it is possible that this server is using an anti-bot service called &#8220;BlackTDS&#8221;. This service is described on the official website as &#8220;the best solution for cleaning traffic and protecting bots&#8221; (Figure 3), but in fact it is reported by ProofPoint to be abused by attackers as Drive-by as a service [1].<\/span><\/p>\n<figure id=\"attachment_331\" aria-describedby=\"caption-attachment-331\" style=\"width: 942px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-331 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=640%2C364&#038;ssl=1\" alt=\"\" width=\"640\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?w=942&amp;ssl=1 942w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=300%2C171&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=768%2C437&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=700%2C398&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=520%2C296&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=360%2C205&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=250%2C142&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3.png?resize=100%2C57&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-331\" class=\"wp-caption-text\">Figure3. BlackTDS<\/figcaption><\/figure>\n<ul>\n<li>[1]Drive-by as a service: BlackTDS<br \/>\n<a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/drive-service-blacktds\">https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/drive-service-blacktds<\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In this campaign for Japan, the following filtering of the service may be used.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filtering by IPs that fully support IPv6<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filtering by ISP<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filtering by referrer<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filtering by hardware ID.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filtering by hardware ID &#8211; Filtering by anti-bot database with more than 440,000 IP anti-viruses, moderators, search engines, and checker bots<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Therefore, BlackTDS makes it difficult to retrieve files by security researchers and sandboxes. In other words, it increases the difficulty of the investigation.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Features of document files<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In the case of the campaign for Japan, when extracting a ZIP file with a password downloaded from a link in an email and opening the document file, a template with a Japanese design is displayed, as shown in Figure4.<\/span><\/p>\n<figure id=\"attachment_332\" aria-describedby=\"caption-attachment-332\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-332 size-large\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=640%2C483&#038;ssl=1\" alt=\"\" width=\"640\" height=\"483\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=1024%2C773&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=300%2C227&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=768%2C580&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=700%2C529&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=520%2C393&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=360%2C272&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=250%2C189&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?resize=100%2C76&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image4.png?w=1323&amp;ssl=1 1323w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-332\" class=\"wp-caption-text\">Figure4. Example of a malicious document file in Japanese<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Since the design of the document file may be common to other malware, it may be difficult to determine whether it is related to this attack by appearance. It is also possible that the design may change in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following sections provide an overview of the behavior\u00a0 and the latest document file behavior at the time of writing (April 2021).<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Overview of malicious document Behaviour<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If the Office product has default settings, when a user opens a document file and clicks on &#8220;Enable Content&#8221;, an Excel 4.0 macro (referred to as &#8220;macro&#8221;) is executed and the file is dropped with the text embedded in the document file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the document file that we have seen in the series of attacks, the sheet where the macro is set is hidden, and the sheet contains the string to execute the macro. (shown in Figure5, Figure6)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, due to the &#8220;Auto_Open&#8221; setting of the document file book, malicious macros will be automatically executed when the document file is opened.(shown in Figure5, Figure6)<\/span><\/p>\n<figure id=\"attachment_333\" aria-describedby=\"caption-attachment-333\" style=\"width: 903px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-333 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=640%2C220&#038;ssl=1\" alt=\"\" width=\"640\" height=\"220\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?w=903&amp;ssl=1 903w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=300%2C103&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=768%2C265&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=700%2C241&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=520%2C179&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=360%2C124&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=250%2C86&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5.png?resize=100%2C34&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-333\" class=\"wp-caption-text\">Figure5. Example of macro functions on April 9, 2021<\/figcaption><\/figure>\n<figure id=\"attachment_334\" aria-describedby=\"caption-attachment-334\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-334 size-large\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=640%2C132&#038;ssl=1\" alt=\"\" width=\"640\" height=\"132\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=1024%2C211&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=300%2C62&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=768%2C159&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=700%2C145&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=520%2C107&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=360%2C74&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=250%2C52&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?resize=100%2C21&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image6.png?w=1167&amp;ssl=1 1167w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-334\" class=\"wp-caption-text\">Figure6. Another example of macro functions on April 9, 2021<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The string saved by the SAVE.AS function is decoded using certutil.exe and saved under a different file name. (Campo Loader) After that, Campo Loader is executed using rundll32.exe with CALL function etc. (Figure7).<\/span><\/p>\n<figure id=\"attachment_335\" aria-describedby=\"caption-attachment-335\" style=\"width: 808px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-335 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=640%2C76&#038;ssl=1\" alt=\"\" width=\"640\" height=\"76\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?w=808&amp;ssl=1 808w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=300%2C36&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=768%2C91&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=700%2C83&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=520%2C62&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=360%2C43&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=250%2C30&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7.png?resize=100%2C12&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-335\" class=\"wp-caption-text\">Figure7. Example of macro functions on April 9, 2021<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">These series of behaviors are implemented by directly calling the functions of the standard Windows modules (DLL) in addition to macros.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Document files used in the April 9<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The following shows the flow from the most recent (April 9) document file observed to the execution of Campo Loader (Figures 8 and 9).<\/span><\/p>\n<figure id=\"attachment_391\" aria-describedby=\"caption-attachment-391\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-391\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=640%2C228&#038;ssl=1\" alt=\"\" width=\"640\" height=\"228\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=1024%2C364&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=300%2C107&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=768%2C273&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=700%2C249&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=520%2C185&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=360%2C128&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=250%2C89&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?resize=100%2C36&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?w=1369&amp;ssl=1 1369w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33-1.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-391\" class=\"wp-caption-text\">Figure8. Infection flow when a document file is opened<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_337\" aria-describedby=\"caption-attachment-337\" style=\"width: 664px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-337 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=640%2C204&#038;ssl=1\" alt=\"\" width=\"640\" height=\"204\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?w=664&amp;ssl=1 664w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=300%2C96&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=520%2C166&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=360%2C115&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=250%2C80&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9.png?resize=100%2C32&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-337\" class=\"wp-caption-text\">Figure9. Process tree when a document file is opened<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The flow of operation is as follows.\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When the document file is opened and the content is activated, the malicious macro is activated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The string embedded in the sheet of the document file will be saved as %PUBLIC%\\14118.doy. *1<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The string embedded in the sheet of the document file will be saved as %PUBLIC%\\14118.xlsb. *2\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The contents of %PUBLIC%\\14118.doy will be BASE64 decoded and the result will be saved as %PUBLIC%\\14118.biy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A fake input form will be displayed (Figure10).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">rundll32.exe will execute Campo Loader(%PUBLIC%\\14118.biy). In this case, DF1 is specified as the argument and the DF1 function is called.<\/span><br \/>\n<span style=\"font-weight: 400;\">*1 The numbers in the file name are generated randomly from 9999 to 19999 by a function, but in reality, the numbers are fixed values, as they were when the attacker saved the file.<br \/>\n<\/span><span style=\"font-weight: 400;\">*2 This file is just created and is not actually needed for the attack.<\/span><\/li>\n<\/ol>\n<figure id=\"attachment_338\" aria-describedby=\"caption-attachment-338\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-338 size-large\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=640%2C478&#038;ssl=1\" alt=\"\" width=\"640\" height=\"478\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=1024%2C765&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=768%2C573&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=700%2C523&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=520%2C388&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=360%2C269&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=250%2C187&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?resize=100%2C75&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image10.png?w=1318&amp;ssl=1 1318w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-338\" class=\"wp-caption-text\">Figure10. Fake input form<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2><b>Features of <\/b><b>Campo Loader malware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Campo Loader (a.k.a NLoader) is a malware that is executed after being dropped from a document file. This malware is a downloader, and it has the ability to perform HTTP communication to obtain and execute additional payloads. Since it accesses a path containing &#8220;\/campo\/&#8221; during communication, Orange Cyberdefense named this malware &#8220;Campo Loader&#8221;[2] and came to be used on social networking sites.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Campo Loader appears to have been updated in early March, and the features of HTTP communication have changed. This blog will explain the latest one.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">[2<\/span><span style=\"font-weight: 400;\">] \u300cIn the eye of our CyberSOC: Campo Loader, analysis and detection perspectives\u300d, Orange Cyberdefense, 2021\/03\/23<br \/>\n<\/span><a href=\"https:\/\/orangecyberdefense.com\/global\/blog\/cybersoc\/in-the-eye-of-our-cybersoc-campo-loader-analysis-and-detection-perspectives\/\">https:\/\/orangecyberdefense.com\/global\/blog\/cybersoc\/in-the-eye-of-our-cybersoc-campo-loader-analysis-and-detection-perspectives\/<\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When the Campo Loader is executed, it first creates a directory. As shown in the figure below, the directory name to be created is hard-coded.<\/span><\/p>\n<figure id=\"attachment_339\" aria-describedby=\"caption-attachment-339\" style=\"width: 930px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-339 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=640%2C201&#038;ssl=1\" alt=\"\" width=\"640\" height=\"201\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?w=930&amp;ssl=1 930w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=300%2C94&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=768%2C241&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=700%2C220&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=520%2C163&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=360%2C113&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=250%2C78&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image11.png?resize=100%2C31&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-339\" class=\"wp-caption-text\">Figure11. Function of creating a directory<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Next, send the string &#8220;ping&#8221; to the server using the POST method (Figure12). The server to be communicated with at this time is called the &#8220;Openfield server&#8221; in the following.<\/span><\/p>\n<figure id=\"attachment_392\" aria-describedby=\"caption-attachment-392\" style=\"width: 920px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-392\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=640%2C102&#038;ssl=1\" alt=\"\" width=\"640\" height=\"102\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?w=920&amp;ssl=1 920w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=520%2C83&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image7-1.png?resize=100%2C16&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-392\" class=\"wp-caption-text\">Figure12. Example of a request generated by Campo Loader.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">In this stage of communication, the Openfield server returns a URL as a response (see below for details). For this reason, Campo Loader checks if the response starts with &#8220;h&#8221;, and if it does not, it terminates the process (Figure13).<\/span><\/p>\n<figure id=\"attachment_393\" aria-describedby=\"caption-attachment-393\" style=\"width: 848px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-393\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=640%2C255&#038;ssl=1\" alt=\"\" width=\"640\" height=\"255\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?w=848&amp;ssl=1 848w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=300%2C120&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=768%2C306&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=700%2C279&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=520%2C207&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=360%2C143&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=250%2C100&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1-1.png?resize=100%2C40&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-393\" class=\"wp-caption-text\">Figure13. Checking the character of \u201ch\u201d<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">If the response starts with an &#8220;h&#8221;, send a second &#8220;ping&#8221; message to that URL using the POST method. As a result, an additional payload will be downloaded and saved as a file. The name of the file to be saved is also hard-coded (Figure14).<\/span><\/p>\n<figure id=\"attachment_394\" aria-describedby=\"caption-attachment-394\" style=\"width: 619px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-394\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=619%2C77&#038;ssl=1\" alt=\"\" width=\"619\" height=\"77\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?w=619&amp;ssl=1 619w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=300%2C37&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=520%2C65&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=360%2C45&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=250%2C31&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image3-1.png?resize=100%2C12&amp;ssl=1 100w\" sizes=\"(max-width: 619px) 100vw, 619px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-394\" class=\"wp-caption-text\">Figure14. Example of hardcoded URLs<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Then rundll32.exe will be used to call the function in the DLL file you downloaded. The name of the function to be called is usually the &#8220;DF&#8221; function *. This call argument is also hard-coded.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Campo Loader is also available as an exe file that can be downloaded and executed. In past cases in Japan, Campo Loader has directly executed malware such as Ursnif and Zloader. However, recent campaigns for Japan have tended to use DLL versions, and have shifted to downloading and executing to the DFDownloader described later in this article.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">*Note that Campo Loader uses function names such as &#8220;DF&#8221; and &#8220;DF1&#8221; as the export function, but DFDownloader, the malware described later, also uses the same name &#8220;DF&#8221; as the function name, so be careful not to confuse Campo Loader and DFDownloader in this section.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Features of Openfield<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The Openfield server indicates the server where the payload is hosted for Campo Loader to get. One of the main features is the inclusion of the string &#8220;\/campo\/&#8221; in the URL when getting the payload. In this section, we will explain the contents of the response and the results of our investigation for this server.<\/span><\/p>\n<h3><b>Response from Openfield Server<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">By sending &#8220;ping&#8221; in the HTTP body by the POST method under the &#8220;campo&#8221; directory, the next URL to access can be obtained (Figure15 and 16).<\/span><span style=\"font-weight: 400;\">In past cases, we observed cases where the response indicated a redirection, but nowadays, the response generally includes the URL.<\/span><\/p>\n<figure id=\"attachment_395\" aria-describedby=\"caption-attachment-395\" style=\"width: 891px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-395\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=640%2C230&#038;ssl=1\" alt=\"\" width=\"640\" height=\"230\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?w=891&amp;ssl=1 891w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=300%2C108&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=768%2C276&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=700%2C251&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=520%2C187&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=360%2C129&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=250%2C90&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-1.png?resize=100%2C36&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-395\" class=\"wp-caption-text\">Figure15. Example of the response 1<\/figcaption><\/figure>\n<figure id=\"attachment_396\" aria-describedby=\"caption-attachment-396\" style=\"width: 858px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-396\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=640%2C268&#038;ssl=1\" alt=\"\" width=\"640\" height=\"268\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?w=858&amp;ssl=1 858w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=300%2C126&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=768%2C321&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=700%2C293&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=520%2C218&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=360%2C151&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=250%2C105&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image26-1.png?resize=100%2C42&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-396\" class=\"wp-caption-text\">Figure16. Example of the response 2<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">There is a possibility that BlackTDS is used for the Openfield server as well as &#8220;5. Features of the linked server\u201d. Hence, if the BlackTDS service determines that the connection is coming from cyber security\u00a0 researchers, it will redirect the user to a legitimate site such as Yahoo or GNU.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The URL to be passed to Campo Loader as a response can be one of the following two cases.\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A URL that indicates a different directory on the same server (such as under \/uploads\/files\/)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">URLs of other Openfield servers.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In addition, we have observed cases in which malware was placed on compromised servers in past campaigns for Japan and overseas.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Characteristics of IP address and Domain name combination<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Both IP addresses and domain names have been used for URLs in the past, but recently attackers have tended to use domain names. Domain names are registered with the Namecheap service, and have the regularity of &#8220;word + number + xyz domain&#8221;. Our research also shows that the range of IP addresses associated with domain names is 176.111.174.0\/24. (shown in Table1.)<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table<\/span><span style=\"font-weight: 400;\">1. <\/span><span style=\"font-weight: 400;\">\u00a0Examples of combination of domain name and resolved IP address used for the Openfield<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Target<\/b><\/td>\n<td><b>Domain names<\/b><\/td>\n<td><b>IP Addresses<\/b><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">bfdnews[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]72<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">groupeu[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]72<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">allcafe[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]72<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">gainme[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]53<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Japan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">ship4[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]53<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Japan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">gopigs[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]53<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">beauty1[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]53<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">about2[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]57<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Japan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">board3[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]57<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Japan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">cake3[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]58<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Japan<\/span><\/td>\n<td><span style=\"font-weight: 400;\">dance4[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]61<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">hall4[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]62<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">keep2[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]62<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">lie3[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]59<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">out2[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]60<\/span><\/td>\n<\/tr>\n<tr>\n<td>Not Japan<\/td>\n<td><span style=\"font-weight: 400;\">noise1[.]xyz<\/span><\/td>\n<td><span style=\"font-weight: 400;\">176.111.174[.]60<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3><b>The origin and function of the Openfield server<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">&#8220;Openfield&#8221; is the name given by the Cryptolaemus Team (@Cryptolaemus1), an international security research team, to identify this server.<\/span><\/p>\n<div class=\"twitter-tweet\">\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Trickbot?src=hash&amp;ref_src=twsrc%5Etfw\">#Trickbot<\/a> gtag mon88 <a href=\"https:\/\/t.co\/D3U5S10zJQ\">https:\/\/t.co\/D3U5S10zJQ<\/a><br \/>This \/campo\/x\/x actor is some sort of distro as a service group that loves to do these 1 or 2 letter subdirectories like that. We have started to call them <a href=\"https:\/\/twitter.com\/hashtag\/openfield?src=hash&amp;ref_src=twsrc%5Etfw\">#openfield<\/a> or <a href=\"https:\/\/twitter.com\/hashtag\/campoloader?src=hash&amp;ref_src=twsrc%5Etfw\">#campoloader<\/a> because they always have the same structure.<\/p>\n<p>&mdash; Cryptolaemus (@Cryptolaemus1) <a href=\"https:\/\/twitter.com\/Cryptolaemus1\/status\/1365494339883958272?ref_src=twsrc%5Etfw\">February 27, 2021<\/a><\/p><\/blockquote>\n<\/div>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The name comes from the fact that the directory listing feature of the web server has been enabled, and the contents could be viewed (commonly referred to as &#8220;open directory&#8221;). <\/span><span style=\"font-weight: 400;\">In our research, we confirmed that the list of contents on the Openfield server had been viewable. However, this setting has been modified.(shown in Figure17)<\/span><\/p>\n<figure id=\"attachment_397\" aria-describedby=\"caption-attachment-397\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-397\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=640%2C308&#038;ssl=1\" alt=\"\" width=\"640\" height=\"308\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=1024%2C492&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=300%2C144&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=768%2C369&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=700%2C336&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=520%2C250&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=360%2C173&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=250%2C120&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?resize=100%2C48&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image20-1.png?w=1111&amp;ssl=1 1111w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-397\" class=\"wp-caption-text\">Figure17. Directory listing of the Openfield server<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The Openfield server also has a login panel. As shown in Figure17 (left), the Openfield server may have functions related to sending mail, since the names &#8220;smtp&#8221; and &#8220;mails&#8221; are used in the directory.(Figure18)<\/span><\/p>\n<figure id=\"attachment_398\" aria-describedby=\"caption-attachment-398\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-398\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=640%2C317&#038;ssl=1\" alt=\"\" width=\"640\" height=\"317\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=1024%2C507&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=300%2C149&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=768%2C380&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=700%2C347&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=520%2C258&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=360%2C178&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=250%2C124&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?resize=100%2C50&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27-1.png?w=1153&amp;ssl=1 1153w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-398\" class=\"wp-caption-text\">Figure18. The login panel of the Openfield server<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2><b>Features of the DFDownloader malware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DFDownloader is the second stage malware that is downloaded and executed by Campo Loader. This malware is a downloader and is responsible for downloading and executing the next stage of malware. In addition to downloading and executing, it also has the ability to persist and update itself, making it more feature-rich than Campo Loader. In addition, DFDownloader has embedded version information, and since it is frequently upgraded, it is expected to be used continuously in the future. In the following sections, we will explain the operation of DFDownloader. As we will explain later, we have confirmed that some overseas cases do not use DFDownloader.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Anti-Sandbox Function<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DFDownloader has an anti-sandbox feature: DFDownloader will first check the total amount of memory on your system, and if it is less than 4 GiB, it will kill the process. There are also several loops in the sleep function, and these functions may prevent the process from running properly in a sandboxed environment.(Figure19)<\/span><\/p>\n<figure id=\"attachment_399\" aria-describedby=\"caption-attachment-399\" style=\"width: 765px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-399\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=640%2C421&#038;ssl=1\" alt=\"\" width=\"640\" height=\"421\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?w=765&amp;ssl=1 765w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=300%2C197&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=700%2C460&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=520%2C342&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=360%2C237&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=250%2C164&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image38-1.png?resize=100%2C66&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-399\" class=\"wp-caption-text\">Figure19. Memory checking<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><b>Encryption<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As shown in Figure20, DFDownloader keeps the string to be used encrypted with XOR. <\/span><span style=\"font-weight: 400;\">These strings contain information about C2 and the functions to be used. <\/span><span style=\"font-weight: 400;\">The XOR routines for decrypting these strings are also used when decrypting the response from the server.<\/span><\/p>\n<figure id=\"attachment_400\" aria-describedby=\"caption-attachment-400\" style=\"width: 733px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-400\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=640%2C478&#038;ssl=1\" alt=\"\" width=\"640\" height=\"478\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?w=733&amp;ssl=1 733w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=700%2C523&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=520%2C389&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=360%2C269&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=250%2C187&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image13-1.png?resize=100%2C75&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-400\" class=\"wp-caption-text\">Figure20. Example of XOR strings<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><b>Communication flow<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The communication flow by DFDownloader is shown in the figure below. There are four types of data formats that DFDownloader uses when it communicates with the C2 server.<\/span><\/p>\n<figure id=\"attachment_401\" aria-describedby=\"caption-attachment-401\" style=\"width: 1000px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-401\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=640%2C352&#038;ssl=1\" alt=\"\" width=\"640\" height=\"352\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?w=1000&amp;ssl=1 1000w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=300%2C165&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=768%2C422&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=700%2C385&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=520%2C286&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=360%2C198&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=250%2C138&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image40.png?resize=100%2C55&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-401\" class=\"wp-caption-text\">Figure 21: Communication flow of DFDownloader<\/figcaption><\/figure>\n<h4><span style=\"font-weight: 400;\">\u2460 Communication of SYS identifiers<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">DFDownloader sends the information collected by the first infected host using the POST method (see the figure below). The information sent at this time is encoded in Base64, and contains identifiers and other information.<\/span><\/p>\n<figure id=\"attachment_402\" aria-describedby=\"caption-attachment-402\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-402\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=640%2C102&#038;ssl=1\" alt=\"\" width=\"640\" height=\"102\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=1024%2C163&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=520%2C83&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image9-1.png?w=1174&amp;ssl=1 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-402\" class=\"wp-caption-text\">Figure22. First communication example (SYS identifier)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The details of the information sent to the server are shown in the table below. For these requests, the server usually returns a response with the HTTP status code &#8220;200 OK&#8221;.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table2 The details of the sending data<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Value samples<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Description<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">SYS<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Identifier<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">10<\/span><\/td>\n<td><span style=\"font-weight: 400;\">OS Major Version<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">17763<\/span><\/td>\n<td><span style=\"font-weight: 400;\">OS Build Number<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">DESKTOP-AABSVH71760622929<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Computername and Volume serial number<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">test<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Username<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">64<\/span><\/td>\n<td><span style=\"font-weight: 400;\">OS-bit number<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">1.28r<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DFDownloader version number\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">0 or 1<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">7545391<\/span><\/td>\n<td><span style=\"font-weight: 400;\">N\/A<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">\u2461Communication with BIN identifier<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The second communication using the BIN identifier (see the figure below).<\/span><\/p>\n<figure id=\"attachment_403\" aria-describedby=\"caption-attachment-403\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-403\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=640%2C102&#038;ssl=1\" alt=\"\" width=\"640\" height=\"102\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=1024%2C163&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=520%2C83&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image12-1.png?w=1174&amp;ssl=1 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-403\" class=\"wp-caption-text\">Figure23. Second traffic example (BIN identifier)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">When you receive a response from the server, DFDownloader decrypts the response with XOR and checks if the first byte starts with &#8220;MZ&#8221; (the magic number of the PE file). <\/span><span style=\"font-weight: 400;\">If it is a PE file, it saves the received data as a file, and then registers the value in the registry using the path of the created file (as shown below).<\/span><\/p>\n<figure id=\"attachment_404\" aria-describedby=\"caption-attachment-404\" style=\"width: 960px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-404\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=640%2C362&#038;ssl=1\" alt=\"\" width=\"640\" height=\"362\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=300%2C170&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=768%2C434&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=700%2C396&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=520%2C294&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=360%2C204&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=250%2C141&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-1.png?resize=100%2C57&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-404\" class=\"wp-caption-text\">Figure 24. Example of registry values<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">This registration in the registry will cause the DFDownloader to run when the user logs on to the terminal, this means persistence of the infection. We have confirmed that this communication causes the DFDownloader to be updated. When this happens, it saves new files, rewrites the registry values, and deletes old files and directories.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">\u2462Communication with PNG Identifier<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The third communication using the PNG identifier.<\/span><\/p>\n<figure id=\"attachment_405\" aria-describedby=\"caption-attachment-405\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-405\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=640%2C101&#038;ssl=1\" alt=\"\" width=\"640\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=1024%2C162&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=520%2C82&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-1.png?w=1174&amp;ssl=1 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-405\" class=\"wp-caption-text\">Figure25. Third communication example (PNG identifier)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Depending on the value received from the server in this communication, the process branches as shown in the table below. Some parts of the branching process are still under development, and it is expected that additional functions will be added in future versions.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table 3 Commands<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Value<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Description<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">0x31<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Save and execute the file (DLL or EXE) to be retrieved in the following communication; the function name can be specified in the case of DLL<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">0x32<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Save and execute the file (DLL) to be acquired in the following communication.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, the DFDownloader process exits after execution.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">0x33<\/span><\/td>\n<td><span style=\"font-weight: 400;\">unimplemented<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">0x34<\/span><\/td>\n<td><span style=\"font-weight: 400;\">unimplemented<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h4><span style=\"font-weight: 400;\">\u2463Communication with the BN identifier<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Finally, the communication using the BN identifier (see the figure below). <\/span><span style=\"font-weight: 400;\">In this communication, depending on the result of communication \u2462, the payload to be executed in each branch is obtained from the server.\u00a0<\/span><span style=\"font-weight: 400;\">As mentioned earlier, the payload to be obtained is a DLL file or an EXE file.<\/span><\/p>\n<figure id=\"attachment_406\" aria-describedby=\"caption-attachment-406\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-406\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=640%2C101&#038;ssl=1\" alt=\"\" width=\"640\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=1024%2C162&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=520%2C82&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image5-1.png?w=1173&amp;ssl=1 1173w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-406\" class=\"wp-caption-text\">Figure 26. Fourth communication example (BN identifier)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Then, a new process is created by the CreateProcessA function; if it is an EXE file, it is executed as is; if it is a DLL file, rundll32.exe is used. <\/span><span style=\"font-weight: 400;\">Since loop processing is implemented in this malware, even if this couldn\u2019t get the expected response from the server, the communication in \u2462 and \u2463 will occur again and again. ( <\/span><span style=\"font-weight: 400;\">The communication interval is not constant.)<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Consideration of follow-up malwares<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">At the time of writing (April 2021), we have not been able to confirm any follow-up payloads. However, similar cases have been reported overseas, and we assume that infections by this campaign may spread in Japan like these cases in the future. Also, before the use of Campo Loader and DFDownloader, we have seen attack campaigns by the same attacker group, so it is not difficult to guess the attack trend. In this section, we will discuss the malware that can be infected based on overseas cases and past cases.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The following figure shows the malware that may be infected subsequently based on similar cases so far. There have been cases where the Campo Loader has been infected with the malware shown in the blue box in the figure below, and we think that this infection may progress in the same way from the DFDownloader.<\/span><\/p>\n<figure id=\"attachment_475\" aria-describedby=\"caption-attachment-475\" style=\"width: 1251px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-475 size-full\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=640%2C259&#038;ssl=1\" alt=\"\" width=\"640\" height=\"259\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?w=1251&amp;ssl=1 1251w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=300%2C121&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=1024%2C414&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=768%2C311&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=700%2C283&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=520%2C210&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=360%2C146&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=250%2C101&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image27_2.png?resize=100%2C40&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-475\" class=\"wp-caption-text\">Figure27. Consideration of infection step of follow-up malwares<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">As you can see, various types of impact can be expected depending on the type of malware, such as information theft, remote access, and ransomware. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Previous attacks on Japan using Campo Loader<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">We have observed cases of Ursnif and Zloader infection [3] before this attack campaign In Japan.\u00a0 In this case, the Openfield server was used, but not the Campo Loader or DFDownloader. It is possible that this attack campaign may also infect Ursnif and Zloader like past cases.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">[<\/span><span style=\"font-weight: 400;\">3<\/span><span style=\"font-weight: 400;\">] \u300c2020\/10\/14(\u706b) \u6dfb\u4ed8\u30d5\u30a1\u30a4\u30eb\u4ed8\u4e0d\u5be9\u30e1\u30fc\u30eb\u300c\u3010\u304a\u632f\u8fbc\u53e3\u5ea7\u5909\u66f4\u306e\u3054\u9023\u7d61\u3011\u300d\uff08ZLoader\uff09\u306e\u8abf\u67fb\u300d, bomb_blog, 2020\/10\/28<br \/>\n<\/span><a href=\"https:\/\/bomccss.hatenablog.jp\/entry\/2020\/10\/28\/125630\">https:\/\/bomccss.hatenablog.jp\/entry\/2020\/10\/28\/125630<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><b>The other cases of using Campo Loader except Japan<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are several reported cases of the use of Campo Loader.\u00a0 <\/span><span style=\"font-weight: 400;\">In these cases, the URL returned as a response to the Campo Loader is malware. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another similar case except Japan is an attack campaign called &#8220;Bazar Call&#8221;. In this campaign, users call a contact listed in an email, which leads them to a link in a document file that leads to infection. [4]\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This campaign also uses the Campo Loader, which is dropped from the document file as in this attack campaign, runs and accesses the Openfield server to download and execute the BazarLoader (Figure 28).<\/span><\/p>\n<figure id=\"attachment_409\" aria-describedby=\"caption-attachment-409\" style=\"width: 866px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-409\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=640%2C234&#038;ssl=1\" alt=\"\" width=\"640\" height=\"234\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?w=866&amp;ssl=1 866w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=300%2C110&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=768%2C281&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=700%2C256&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=520%2C190&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=360%2C132&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=250%2C92&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image35-1.png?resize=100%2C37&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-409\" class=\"wp-caption-text\">Figure 28. Example of communication to get the BazarLoader in the BazarCall campaign.<br \/>(Source: https:\/\/www.malware-traffic-analysis.net\/2021\/04\/16\/index2.html)<\/figcaption><\/figure>\n<ul>\n<li><span style=\"font-weight: 400;\">[4] BazarCall malware uses malicious call centers to infect victims<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bazarcall-malware-uses-malicious-call-centers-to-infect-victims\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/bazarcall-malware-uses-malicious-call-centers-to-infect-victims\/<\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In other cases, there have been reports of Trickbot and Phobos Ransomware infections from the older Campo Loader; these cases were reported around September-October 2020, but the malware is still active, so we have to be careful.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">[5<\/span><span style=\"font-weight: 400;\">]\u300cDeep Analysis \u2013 The EKING Variant of Phobos Ransomware\u300d, Fortinet, 2020\/10\/13<br \/>\n<a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/deep-analysis-the-eking-variant-of-phobos-ransomware\">https:\/\/www.fortinet.com\/blog\/threat-research\/deep-analysis-the-eking-variant-of-phobos-ransomware<\/a><\/span><\/li>\n<li><span style=\"font-weight: 400;\">[6] <\/span><span style=\"font-weight: 400;\">\u300cTRICKBOT AND EMOTET DELIVERY THROUGH WORD MACRO\u300d, Morphisec, 2020\/9\/16<br \/>\n<\/span><a href=\"https:\/\/blog.morphisec.com\/trickbot-emotet-delivery-through-word-macro\">https:\/\/blog.morphisec.com\/trickbot-emotet-delivery-through-word-macro<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>Relevance to other campaigns<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This section explains the relevance to other campaigns that were discovered during the research process.<\/span><\/p>\n<h3><b>Relevance to the BazarCall campaign<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As an example, the fake input form displayed when opening the document file used in the April 9 attack on Japan is almost the same as a fake input form mentioned in the report [7] released by Sophos on April 15. (Figure29, and 30)<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">[7] &#8220;BazarLoader deploys a pair of novel spam vectors&#8221;, Sophos, 2021\/04\/15 <\/span><br \/>\n<a href=\"https:\/\/news.sophos.com\/en-us\/2021\/04\/15\/bazarloader\/\"><span style=\"font-weight: 400;\">https:\/\/news.sophos.com\/en-us\/2021\/04\/15\/bazarloader\/<\/span><\/a><\/li>\n<\/ul>\n<figure id=\"attachment_357\" aria-describedby=\"caption-attachment-357\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-357 size-large\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=640%2C478&#038;ssl=1\" alt=\"\" width=\"640\" height=\"478\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=1024%2C765&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=300%2C224&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=768%2C573&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=700%2C523&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=520%2C388&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=360%2C269&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=250%2C187&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?resize=100%2C75&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image29.png?w=1318&amp;ssl=1 1318w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-357\" class=\"wp-caption-text\">Figure29. Fake input form shown in the April 9 attack campaign for Japan.<\/figcaption><\/figure>\n<figure id=\"attachment_358\" aria-describedby=\"caption-attachment-358\" style=\"width: 666px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-358\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=640%2C510&#038;ssl=1\" alt=\"\" width=\"640\" height=\"510\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?w=856&amp;ssl=1 856w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=300%2C239&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=768%2C613&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=700%2C559&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=520%2C415&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=360%2C287&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=250%2C199&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image30.png?resize=100%2C80&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-358\" class=\"wp-caption-text\">Figure 30. Fake input form mentioned in the report published by Sophos.<br \/>(Source : https:\/\/news.sophos.com\/en-us\/2021\/04\/15\/bazarloader\/)<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Furthermore, the behavior of the document files used in the series of attacks for Japan is almost the same as well (Figure31 and 32).<\/span><\/p>\n<figure id=\"attachment_359\" aria-describedby=\"caption-attachment-359\" style=\"width: 664px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-359\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=640%2C204&#038;ssl=1\" alt=\"\" width=\"640\" height=\"204\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?w=664&amp;ssl=1 664w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=300%2C96&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=520%2C166&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=360%2C115&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=250%2C80&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image31.png?resize=100%2C32&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-359\" class=\"wp-caption-text\">Figure 31. Process tree of the document file in the April 9 attack campaign against Japan.<\/figcaption><\/figure>\n<figure id=\"attachment_360\" aria-describedby=\"caption-attachment-360\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-360\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=640%2C124&#038;ssl=1\" alt=\"\" width=\"640\" height=\"124\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=1024%2C199&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=300%2C58&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=768%2C149&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=700%2C136&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=520%2C101&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=360%2C70&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=250%2C48&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?resize=100%2C19&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32.png?w=1031&amp;ssl=1 1031w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-360\" class=\"wp-caption-text\">Figure32. Process tree mentioned in the report published by Sophos.<br \/>(Source : https:\/\/news.sophos.com\/en-us\/2021\/04\/15\/bazarloader\/)<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><b>Similarity of packers\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are multiple variations of the packer used in Campo Loader and DFDownloader, and some of the packers are similar to those used in Trickbot and BazarLoader.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The figure below shows part of the code of the packer used in Campo Loader and DFDownloader (1.28r). The packer uses the CryptoAPI to encrypt the malware itself, with the CryptImportKey function importing the RSA2 key and CryptEncrypt processing the data in RC4 cipher.<\/span><\/p>\n<figure id=\"attachment_361\" aria-describedby=\"caption-attachment-361\" style=\"width: 716px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-361\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=640%2C450&#038;ssl=1\" alt=\"\" width=\"640\" height=\"450\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?w=716&amp;ssl=1 716w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=300%2C211&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=700%2C492&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=520%2C365&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=360%2C253&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=250%2C176&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image33.png?resize=100%2C70&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-361\" class=\"wp-caption-text\">Figure 33. Example of Campo Loader&#8217;s packer<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_362\" aria-describedby=\"caption-attachment-362\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-362\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=640%2C429&#038;ssl=1\" alt=\"\" width=\"640\" height=\"429\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?w=700&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=300%2C201&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=520%2C348&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=360%2C241&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=250%2C168&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image34.png?resize=100%2C67&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-362\" class=\"wp-caption-text\">Figure 34. Example of DFDownloader&#8217;s packer.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">These source codes show similar characteristics to the packer used by BazarLoader, as described in Cybereason&#8217;s blog [8], and the packer used by Trickbot, as described in VIPRE Labs&#8217; blog [9]. These similarities also indicate that Trickbot and BazarLoader might be related to this attack campaign.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">[8] A Bazar of Tricks: Following Team9\u2019s Development Cycles<br \/>\n<\/span><a href=\"https:\/\/www.cybereason.com\/blog\/a-bazar-of-tricks-following-team9s-development-cycles\">https:\/\/www.cybereason.com\/blog\/a-bazar-of-tricks-following-team9s-development-cycles<\/a><\/li>\n<li><span style=\"font-weight: 400;\">[9] \u300cTrickbot\u2019s Tricks\u300dPosted by VIPRE Labs<br \/>\n<\/span><a href=\"https:\/\/labs.vipre.com\/trickbots-tricks\/\">https:\/\/labs.vipre.com\/trickbots-tricks\/<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><b>How to check for malware execution traces<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The following is how to check the malware execution traces.<\/span><\/p>\n<h3><b>Automatic Startup Settings<\/b><\/h3>\n<h4><span style=\"font-weight: 400;\">Registry<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DFDownloader registers a DLL file in the registry for persistence.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DFDownloader is executed when the user logs on to the terminal.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table 4. Registry values<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Item<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Value<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Registry key<\/span><\/td>\n<td><span style=\"font-weight: 400;\">HKCU\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Value<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Shell<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Data type<\/span><\/td>\n<td><span style=\"font-weight: 400;\">REG_SZ<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Data<\/span><\/td>\n<td><span style=\"font-weight: 400;\">(e.g.) explorer.exe, regsvr32.exe C:\\ProgramData\\nmvhg\\nmvhg.dll<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_410\" aria-describedby=\"caption-attachment-410\" style=\"width: 960px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-410\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=640%2C362&#038;ssl=1\" alt=\"\" width=\"640\" height=\"362\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?w=960&amp;ssl=1 960w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=300%2C170&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=768%2C434&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=700%2C396&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=520%2C294&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=360%2C204&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=250%2C141&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image32-2.png?resize=100%2C57&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-410\" class=\"wp-caption-text\">Figure 35. Example of the registry values<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><b>Network Traffic and Proxy Logs<\/b><\/h3>\n<h4><span style=\"font-weight: 400;\">Communication of Campo Loader<\/span><\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">Use the POST method with no User-Agent in the HTTP header.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The domain name tends to be the xyz domain.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The URL can be expressed by regular expression as\u00a0 <\/span>&#8220;\\\/campo\\\/([a-z0-9]{1,2})\\\/([a-z0-9]{1,3})&#8221;.<\/li>\n<\/ul>\n<figure id=\"attachment_412\" aria-describedby=\"caption-attachment-412\" style=\"width: 891px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-412\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=640%2C230&#038;ssl=1\" alt=\"\" width=\"640\" height=\"230\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?w=891&amp;ssl=1 891w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=300%2C108&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=768%2C276&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=700%2C251&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=520%2C187&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=360%2C129&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=250%2C90&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image21-2.png?resize=100%2C36&amp;ssl=1 100w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-412\" class=\"wp-caption-text\">Figure 36. Campo Loader communication example<\/figcaption><\/figure>\n<h4><span style=\"font-weight: 400;\">Communication of DFDownloader<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The POST method is used with no User-Agent in the HTTP header.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The domain name tends to use the xyz domain.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Content-Length of a request is about 40 to 100 bytes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Server responses are encrypted with XOR, and the XOR key is a different value for each infected host. Example: &#8220;DESKTOP-AABSVH71760622929&#8221;.<\/span><\/li>\n<\/ul>\n<figure id=\"attachment_365\" aria-describedby=\"caption-attachment-365\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-365\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=640%2C102&#038;ssl=1\" alt=\"\" width=\"640\" height=\"102\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=1024%2C163&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=520%2C83&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image37.png?w=1174&amp;ssl=1 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-365\" class=\"wp-caption-text\">Figure 37. Example of DFDownloader communication 1<\/figcaption><\/figure>\n<figure id=\"attachment_414\" aria-describedby=\"caption-attachment-414\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-414 size-large\" src=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=640%2C101&#038;ssl=1\" alt=\"\" width=\"640\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=1024%2C162&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=300%2C48&amp;ssl=1 300w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=768%2C122&amp;ssl=1 768w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=700%2C111&amp;ssl=1 700w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=520%2C82&amp;ssl=1 520w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=360%2C57&amp;ssl=1 360w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=250%2C40&amp;ssl=1 250w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?resize=100%2C16&amp;ssl=1 100w, https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image17-2.png?w=1174&amp;ssl=1 1174w\" sizes=\"(max-width: 640px) 100vw, 640px\" data-recalc-dims=\"1\" \/><figcaption id=\"caption-attachment-414\" class=\"wp-caption-text\">Figure 38. Example of DFDownloader communication 2<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h3><b>Created Files<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Please check if any of the following files have been created.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">*Please note that the name and destination of the file can be easily changed by an attacker.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Document files<\/span><\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">The folder path used to store the files is consistently &#8220;C:\\Users\\Public\\&#8221;, and the file name changes depending on the attack campaign.<\/span><\/li>\n<li>The table below shows the generated files for the document files we checked.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table 5. Examples of generated files by document file<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">File<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Description<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\Users\\Public\\14118.doy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">File dropped by document file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Used in a campaign for Japan on April 9, 2021.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\Users\\Public\\14118.xlsb<\/span><\/td>\n<td><span style=\"font-weight: 400;\">File dropped by document file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Used in a campaign for Japan on April 9, 2021.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\Users\\Public\\14118.biy<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The file generated by Base64 decoding the data in &#8220;C:\\Users\\Public\\14118.doy&#8221; (Campo Loader).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Used in a campaign for Japan on April 9, 2021.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><span style=\"font-weight: 400;\">Campo Loader<\/span><\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">The saved file path and file name are hard-coded in the Campo Loader that is dropped from the document file.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The folder path used to store the files is consistently &#8220;C:\\ProgramData\\&#8221;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The files generated by Campo Loader are as shown in the table below.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table 6. Examples of files generated by Campo Loader<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Files<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Description<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\ProgramData\\jyqwkf\\jyqwkf.dll<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DLL file downloaded by Campo Loader.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Used in a campaign for Japan on April 9, 2021.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\ProgramData\\yosgu\\yosgu.dll<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DLL file downloaded by Campo Loader.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Used in a campaign for Japan on April 2 and 8, 2021.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h4><span style=\"font-weight: 400;\">DFDownloader<\/span><\/h4>\n<ul>\n<li><span style=\"font-weight: 400;\">The file path and filename saved by DFDownloader are randomly generated. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Depending on the communication result, the folder and file may be deleted.<\/span><\/li>\n<li>The following table shows the files generated by DFDownloader.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">Table 7. Examples of files generated by DFDownloader<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Files<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Description<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\ProgramData\\&lt;random string&gt;\\&lt;random string&gt;.dll<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(e.g.)C:\\ProgramData\\nmvhg\\nmvhg.dll<\/span><\/td>\n<td><span style=\"font-weight: 400;\">DLL file downloaded by DFDownloader<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">C:\\ProgramData\\&lt;random string&gt;\\&lt;random string&gt;.exe<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(e.g.) C:\\ProgramData\\nmvhg\\nmvhg.exe<\/span><\/td>\n<td><span style=\"font-weight: 400;\">EXE file downloaded by DFDownloader\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2><b>Acknowledgments<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We would like to thank the following security researchers for sharing their information with us in writing this blog.<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Cryptolaemus Team (@Cryptolaemus1)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">ExecuteMalware (@executemalware)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">bom (@bomccss)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">\u308f\u304c (@waga_tw)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">moto_sato (@58_158_177_102)<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Malware Traffic Analysis<br \/>\n<\/span><a href=\"https:\/\/www.malware-traffic-analysis.net\/\">https:\/\/www.malware-traffic-analysis.net\/<\/a><\/li>\n<\/ul>\n<h2><\/h2>\n<h2><b>IoCs (As of May 10)<\/b><\/h2>\n<h3><span style=\"font-weight: 400;\">Document file<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">7d1ff39fc6daab153ad6477554415336578256257aa81fd796a48b89c7a8b2e8<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Campo Loader<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">b8212f866c5cdf1a823031e24fe10444aab103d8fb55a25821e1c7c7366e580f<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">DFDownloader<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">8589e2d840c3ed5adbdc160724bdb3c2e703adeec1ec1e29983960c9c00c4469<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Where to communicate with Campo Loader<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Since Openfield servers are also used by malware other than Campo Loader, the following may include communication destinations used by BazarCall and others. <\/span><span style=\"font-weight: 400;\">In addition, other Openfield URL information can be found at <a href=\"https:\/\/urlhaus.abuse.ch\/browse\/tag\/openfield\/\">URLhaus<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">hxxp:\/\/nightsalmon[.]xyz\/campo\/b\/b<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/foreverbold[.]xyz\/campo\/b\/b<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/superstartart[.]xyz\/campo\/b\/b<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/steeltits[.]xyz\/campo\/z\/z<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/steeltits[.]xyz\/campo\/LHq\/cD<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/139.162.150[.]121\/campo\/b\/j<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/185.14.31[.]147\/campo\/j1\/j2<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/ship4[.]xyz\/campo\/i\/i<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/gopigs[.]xyz\/campo\/k\/k<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/board3[.]xyz\/campo\/h\/h2<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/cake3[.]xyz\/campo\/c4\/c4<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/dance4[.]xyz\/campo\/c5\/c5<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/cake3[.]xyz\/uploads\/files\/120.dll<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/chance5[.]xyz\/uploads\/files\/1.dll<br \/>\n<\/span><span style=\"font-weight: 400;\">hxxp:\/\/dance4[.]xyz\/uploads\/files\/120-cr.dll<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Where to communicate with DFDownloader<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">showstoreonline[.]com<br \/>\n<\/span><span style=\"font-weight: 400;\">moviesmenia[.]com<br \/>\n<\/span><span style=\"font-weight: 400;\">avydabiz[.]com<br \/>\n<\/span><span style=\"font-weight: 400;\">kingdomcoffee[.]com<br \/>\n<\/span><span style=\"font-weight: 400;\">domaindnsresolver[.]xyz<br \/>\n<\/span><span style=\"font-weight: 400;\">domainutility[.]xyz<br \/>\n<\/span><span style=\"font-weight: 400;\">domainservicing[.]xyz<br \/>\n<\/span><span style=\"font-weight: 400;\">domainsupply[.]xyz<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since around March 2021, campaigns in Japan using an infrastructure called campo\/openfield have been observed. This campaign has the potential to deliver subsequent malware depending on the infected organization, and some cases eventually could result in ransomware incidents overseas. We keep tracking this attack campaign, and it started to be observed at least around October 2020 as far as we are aware. We anticipate that attackers will continue to be active in the future, and we are concerned that this could lead to serious impacts including ransomware encryption in the worst case. Therefore, in order to prepare for such threats, we will share in this blog the characteristics of campaigns for Japan and how to check for malware execution traces based on our research. &nbsp; Update history Date Details 2021\/5\/11 Published this blog Observation cases of this campaign in Japan Reports of suspicious emails in Japan have been shared on social networking sites.\u00a0 The reports are shown below in chronological order. 2020\/10\/14 https:\/\/twitter.com\/bomccss\/status\/1316163808319041536 2021\/3\/10 https:\/\/twitter.com\/bomccss\/status\/1369612781209591813 2021\/3\/24 https:\/\/twitter.com\/bomccss\/status\/1374526482890944515 2021\/3\/31 https:\/\/twitter.com\/bomccss\/status\/1377280535710494729 2021\/4\/6 https:\/\/twitter.com\/bomccss\/status\/1379240664362143744 2021\/4\/7 https:\/\/twitter.com\/bomccss\/status\/1379602541495738371 2021\/4\/8 https:\/\/twitter.com\/bomccss\/status\/1379970130642235392 2021\/4\/9 https:\/\/twitter.com\/bomccss\/status\/1380327966765314050 Big picture of attack campaign The big picture of the attack campaign is as shown in Figure1. The attack begins with incoming Japanese [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":329,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"en_US","_original_post":"https:\/\/mal-eats.net\/?p=328"},"categories":[3],"tags":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/mal-eats.net\/wp-content\/uploads\/2021\/05\/image1.png?fit=1831%2C677&ssl=1","_links":{"self":[{"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/posts\/428"}],"collection":[{"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/comments?post=428"}],"version-history":[{"count":37,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/posts\/428\/revisions"}],"predecessor-version":[{"id":469,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/posts\/428\/revisions\/469"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/media\/329"}],"wp:attachment":[{"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/media?parent=428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/categories?post=428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mal-eats.net\/wp-json\/wp\/v2\/tags?post=428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}