ThreatFabric documents Letscall, a multi-stage vishing toolkit that blends phishing, spyware, and VOIP manipulation to hijack calls and exfiltrate data from victims in South Korea, with potential expansion to the EU. The campaign uses a downloader, a second-stage spyware, and a third-stage component to route calls to criminal call centers via WebRTC, supported by a web admin panel and a sizable infrastructure.
#Letscall #Vishing #ThreatFabric #ZEGOCLOUD #Banksalad #KICS
#Letscall #Vishing #ThreatFabric #ZEGOCLOUD #Banksalad #KICS
Keypoints
- The Letscall framework comprises three stages: a downloader, a powerful second-stage spyware, and a third-stage companion app that enables call control and redirection.
- Phishing pages mimic legitimate apps (e.g., Google Play Store) to lure victims into downloading the first-stage malware.
- Threat actors use WebRTC with STUN/TURN servers (including Google) to route VOIP traffic and connect victims with call-center operators.
- The second stage leverages ZEGOCLOUD for VOIP/instant messaging and communicates via WebSockets for command and control.
- Extensive evasion techniques are used, including obfuscation (Tencent Legu, Bangcle), long path names, and manifest corruption in APKs.
- The campaign features a sophisticated admin panel (VueJS frontend, Laravel backend) to manage infected devices and orchestrate calls, suggesting MaaS-like capabilities.
MITRE Techniques
- [T1566.002] Phishing – The attacker uses spearphishing links via a decoy page that resembles Google Play Store to lure victims. Quote: “The victim visits a specially crafted phishing web page that looks like Google Play Store.”
- [T1036] Masquerading – phishing pages mimic legitimate banking/loan platforms to appear trustworthy. Quote: “These pages mimic Banksalad (Loan comparison aggregator), Finda (loan comparison aggregator) and KICS (Korea Information System of Criminal-Justice Services).”
- [T1105] Ingress Tool Transfer – the downloader downloads and installs the second-stage malware from the control server. Quote: “The first stage (we will call it the downloader) runs preparations on the device, obtains the necessary permissions, opens the phishing web page, and installs the second stage malware, which will be downloaded from the control server.”
- [T1027] Obfuscated/Compressed Files and Information – APKs contain obfuscated/encoded data (long path names, XOR-encrypted DEX files) to hide code; manifest corruption and code packing are used. Quote: “The core DEX file does not contain the code that is listed inside the manifest… contains obfuscated code… and one-byte XOR encryption.”
- [T1548.003] Abuse of Accessibility Features – The third-stage delivery uses abused accessibility services to inject interface elements into Chrome and drop the third-stage malware. Quote: “By abusing the accessibility services, it will push the necessary interface elements inside of Chrome and deliver the third-stage malware to the victim.”
- [T1071.001] Web Protocols – The malware uses WebSocket-based communications and P2P channels (and WebRTC) for C2/VOIP, including “web sockets” commands. Quote: “Such functionality is needed to perform P2P voice/video connection… and the same channel is also used for C2 communication with many different commands. The malware also supports communication using web sockets.”
Indicators of Compromise
- [File hash] File hashes – Downloader: a522a039ec619a60618c2c8a9e65adb0ff6105b655c1f9b3796e52e0d25958cb; Second stage: 22109901f8290dc2319bd9b49e6bf71f9ddc1af482ddb67fc6e1c3b09ecad9c8; Third stage: bf5259bf53e3747d37d21dbf43b54ff8fa3c57fc991b53fcd320658b6cf34db9
- [Domain] Domains used in infrastructure – finda.letscall.ltd, salad-3.letscall.today, finda-msg.letscall.ltd, salad-msg.letscall.today, salad-h5.letscall.today, finda-h5.letscall.fyi
- [IP] Addresses – 143.92.34.8 (used by multiple domains), 137.220.142.149, 137.220.142.160, 137.220.179.112, 45.43.215.98, 45.43.215.106
- [IP] Additional hosting/participating entities – 35.243.122.211, 154.215.238.195
Read more: https://www.threatfabric.com/blogs/letscall-new-sophisticated-vishing-toolset