Laziok Malware Targets Energy Companies
The Dell Sonicwall Threats Research team observed reports of a bot family named GAV: Laziok.ABB actively spreading in the wild. Laziok targeting mostly in the petroleum and gas industries, suggesting that the attackers have a strategic interest in the energy sector.
Laziok has also been reported by industrial systems in Qatar, Oman, USA, UK, India, Indonesia, Colombia, Cameroon and Uganda.
The Trojan adds the following files to the system:
%SystemRoot%explorersmss.exe [Detected as GAV: Laziok.ABB (Trojan)]]
%Userprofile%Application DataSystemOraclesmss.exe[ Copy of Malware]
%SystemRoot%Application DataSystemOracleazioklmpxhzidhzid.txt [Log file]
The Trojan adds the following keys to the Windows registry to ensure persistence upon reboot:
Laziok performs initial survey collect information about the computers name, installed software and hardware specifications and then it sends those details back to hackers.
These collecting data such as following:
The malware tries to collecting information about installed Anti-Virus on the target system such as following:
The file smss.exe registered as auto startup on windows registry, after next restart the malware uses an injected smss.exe to collecting information about the target computer.
The Malware Creates a Mutex such as following:
The Malware has some base64 encode strings such as following:
Command and Control (C&C) Traffic
Laziok performs C&C communication over port 80. Requests are made on a regular basis to statically defined domains such as:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signature: