Keyhole is a multi-functional VNC/Backconnect component used extensively by IcedID/Anubis, expanding beyond typical backconnect tools. It loads a decoded core module, retrieves system information, hijacks browser profiles, injects into explorer.exe, and supports diverse C2 and data exfiltration behaviors. Hashtags: #Keyhole #IcedID #Anubis #VNC #Backconnect

Keypoints

  • Keyhole is a multi-functional VNC/Backconnect component used by IcedID/Anubis.
  • The loader decodes and loads a core module from an encoded blob, using a 256-byte key/swapping scheme.
  • The core module configures C2 communications (including a C2 address and port 8080).
  • Core capabilities include system information collection, VNC/HDESK/backconnect, browser profile hijacking, and registry/command-line manipulation.
  • Browser manipulation includes copying user data, editing profiles, and launching browsers with special command-line flags.
  • Keyhole can inject into explorer.exe and manipulate browser launch via NtCreateUserProcess and other techniques.
  • It enumerates networks (servers/shares), uses LDAP queries, and can retrieve files from infected systems (up to ~33 MB).

MITRE Techniques

  • [T1021.005] VNC – Remote Services – Keyhole operates as a VNC/Backconnect component to control hosts. “Keyhole is a multi-functional VNC/Backconnect component used extensively by IcedID/Anubis.”
  • [T1059.001] PowerShell – Command-Line / Scripting – The actor uses console commands via PowerShell. “Console command detonation via cmd.exe or powershell”
  • [T1059.003] Windows Command Shell – Command-Line – The same console command execution context via cmd.exe. “Console command detonation via cmd.exe or powershell”
  • [T1055] Process Injection – Multiple methods of injecting explorer.exe. “Multiple methods of injecting explorer.exe”
  • [T1082] System Information Discovery – Collect system information. “Collect system information”
  • [T1046] Network Service Scanning – Enumerating servers and shares in network. “Enumerating servers and shares in network”
  • [T1018] Remote System Discovery – LDAP queries and directory enumeration. “LDAP queries”
  • [T1041] Exfiltration Over C2 Channel – C2 communications configuration and usage. “the values that will be used for C2 communications”
  • [T1125] Video Capture – Taking pictures with webcam. “Taking pictures with webcam”
  • [T1123] Audio Capture – Turning on microphone in registry for apps. “Turning on microphone in registry for apps”
  • [T1112] Modify Registry – Registry manipulation to facilitate browser and app changes. “registry manipulation”
  • [T1555.003] Credentials in Web Browsers – Hijacking browser profiles. “Hijacking browser profiles”

Indicators of Compromise

  • [IPv4] – 91.238.50.101 – C2 address referenced within the decoded config values
  • [Port] – 8080 – C2 port indicated in the config/values
  • [File hash] – 74aa61cc1157529fb98b757fb879616ffc2b54e4d4ff08c9b9d5b6dcec868c2a – Sample hash mentioned in IOCS
  • [File name] – explorer.exe – Recurrent reference in core/module strings and browser manipulation context

Read more: https://medium.com/walmartglobaltech/keyhole-analysis-60302922aa03