LODEINFO is a fileless backdoor malware first identified in 2020 that has been used by actors including MirrorFace, primarily against media, diplomatic, governmental, and public sector organizations in Japan.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
LODEINFO has used Registry run keys to set persistence.[3][4] |
| Enterprise | T1059 | .005 | Command and Scripting Interpreter: Visual Basic |
LODEINFO can use VBA to drop malicious components on targeted hosts.[1] |
| Enterprise | T1486 | Data Encrypted for Impact |
LODEINFO can incorporate a ransom command to encrypt specified files and folders.[5][3][2] |
|
| Enterprise | T1005 | Data from Local System |
LODEINFO can upload files from infected hosts to the C2.[5][3][2] |
|
| Enterprise | T1001 | .001 | Data Obfuscation: Junk Data |
LODEINFO can append C2 communication with randomly generated junk data.[5][3] |
| Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
LODEINFO has collected stolen web cookies locally in the |
| Enterprise | T1573 | .001 | Encrypted Channel: Symmetric Cryptography |
LODEINFO can encrypt C2 communication with a hardcoded (NV4HDOeOVyL) Vigenere cipher key.[5] |
| Enterprise | T1480 | Execution Guardrails |
LODEINFO can halt execution if the "en_US" locale is identified on a victim's machine.[5] |
|
| Enterprise | T1041 | Exfiltration Over C2 Channel |
LODEINFO can exfiltrate collected credentials and browser cookies to the C2 server.[3] |
|
| Enterprise | T1083 | File and Directory Discovery |
LODEINFO has the ability to designate specific files and folders to encryption.[3][2] |
|
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL |
LODEINFO can use legitimate EXE files to sideload malicious DLLs.[1] |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion |
LODEINFO can delete files to remove traces of activity from victim systems.[2] |
| Enterprise | T1105 | Ingress Tool Transfer |
LODEINFO has the ability to download additional files from the C2.[5][3][2] |
|
| Enterprise | T1056 | .001 | Input Capture: Keylogging |
LODEINFO can capture keystrokes on targeted systems.[3][2][4] |
| Enterprise | T1106 | Native API |
LODEINFO can use Windows APIs such as |
|
| Enterprise | T1027 | Obfuscated Files or Information |
LODEINFO has used control flow flattening to obfuscate code.[2] |
|
| .007 | Dynamic API Resolution |
LODEINFO can use a hashing algorithm to dynamically resolve API function addresses.[5] |
||
| .013 | Encrypted/Encoded File |
The LODEINFO loader module contains XOR-encrypted shellcode.[1][5][2] |
||
| .015 | Compression |
LODEINFO components have been compressed with zip for delivery.[1] |
||
| .016 | Junk Code Insertion |
LODEINFO has inserted junk code to obstruct code analysis.[2] |
||
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
LODEINFO has been distributed to targeted victims via malicious email attachments.[1][3][2] |
| Enterprise | T1057 | Process Discovery |
LODEINFO can kill a process using specific process ID.[5][2] |
|
| Enterprise | T1055 | Process Injection |
LODEINFO can inject shellcode into the memory of compromised hosts.[5][3][2] |
|
| Enterprise | T1018 | Remote System Discovery |
LODEINFO can run |
|
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1539 | Steal Web Session Cookie |
LODEINFO can list the contents of |
|
| Enterprise | T1082 | System Information Discovery |
LODEINFO can disover machine information including OS architecture, the ANSI code page (ACP) identifier, and hostname.[5][2] |
|
| Enterprise | T1614 | .001 | System Location Discovery: System Language Discovery |
LODEINFO can looks for the "en_US" locale on the victim’s machine.[5] |
| Enterprise | T1016 | System Network Configuration Discovery |
LODEINFO can enumerate the MAC address of the compromised host.[1] |
|
| Enterprise | T1033 | System Owner/User Discovery |
LODEINFO can identify the associated username on targeted machines.[2] |
|
| Enterprise | T1124 | System Time Discovery | ||
| Enterprise | T1204 | .002 | User Execution: Malicious File |
LODEINFO has been executed via victims opening malicious email attachments.[1][3][2] |
| Enterprise | T1047 | Windows Management Instrumentation | ||
| ID | Name | References |
|---|---|---|
| G1054 | MirrorFace |