Threat actors are marketing a post-exploitation framework called “Exfiltrator-22” that is intended to propagate ransomware in corporate networks covertly. Threat researchers at CYFIRMA believe that this new framework was developed by former Lockbit 3.0 associates who are experienced in defense evasion and anti-analysis, providing a powerful post-exploitation solution in exchange for a monthly fee. Exfiltrator-22 costs $1,000 per month or $5,000 for lifetime usage, with updates and support available at all times. Customers who purchase the framework are given access to an admin panel hosted on a bulletproof VPS from which they can manage the malware employed by the framework and send commands to infected computers.
Threat actors revealed new capabilities at year’s end that assisted in hiding traffic on infected devices, showing that the framework was still being actively developed. EX-22’s creators assessed it to be 87% complete in January 2023, at which point subscription costs were made public and interested customers were invited to buy access to the program. The threat actors used two YouTube demonstration videos to highlight EX-22’s lateral movement and ransomware-spreading features on February 10, 2023. Current capabilities allow operators to:
- Establish a reverse shell with elevated privileges.
- Upload files to the breached system or download files from the host to the C2.
- Activate a keylogger to capture keyboard input.
- Activate a ransomware module to encrypt files on the infected device.
- Capture a screenshot from the victim’s computer.
- Start a live VNC (Virtual Network Computing) session for real-time access on the compromised device.
- Gain higher privileges on the infected device.
- Establish persistence between system reboots.
- Activate a worm module that spreads the malware to other devices on the same network or the public internet.
- Extract data (passwords and tokens) from the LSAAS (Local Security Authority Subsystem Service).
- Generate cryptographic hashes of files on the host to help closely monitor file locations and content change events.
- Fetch the list of running processes on the infected device.
- Extract authentication tokens from the breached system.