Laziok Malware Targets Energy Companies

April 3, 2015

The Dell Sonicwall Threats Research team observed reports of a bot family named GAV: Laziok.ABB actively spreading in the wild. Laziok targeting mostly in the petroleum and gas industries, suggesting that the attackers have a strategic interest in the energy sector.

Laziok has also been reported by industrial systems in Qatar, Oman, USA, UK, India, Indonesia, Colombia, Cameroon and Uganda.

Infection Cycle:

Md5: f38019b1ff17ddf74fb7912d69ce2cea

The Trojan adds the following files to the system:

  • %SystemRoot%explorersmss.exe [Detected as GAV: Laziok.ABB (Trojan)]]

  • %Userprofile%Application DataSystemOraclesmss.exe[ Copy of Malware]

  • %SystemRoot%Application DataSystemOracleazioklmpxhzidhzid.txt [Log file]

The Trojan adds the following keys to the Windows registry to ensure persistence upon reboot:

  • HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunWindows

Laziok performs initial survey collect information about the computers name, installed software and hardware specifications and then it sends those details back to hackers.

These collecting data such as following:

The malware tries to collecting information about installed Anti-Virus on the target system such as following:

The file smss.exe registered as auto startup on windows registry, after next restart the malware uses an injected smss.exe to collecting information about the target computer.

The Malware Creates a Mutex such as following:

The Malware has some base64 encode strings such as following:

Command and Control (C&C) Traffic

Laziok performs C&C communication over port 80. Requests are made on a regular basis to statically defined domains such as:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:

  • GAV: Laziok.ABB