A group of individuals, possibly ex-affiliates or members of LockBit, has developed a new post-exploitation framework called Exfiltrator-22, aka EX-22. It has been created using the leaked source code from other post-exploitation frameworks.
EX-22 functions as a post-exploitation framework-as-a-service model and spreads ransomware in corporate networks while evading detection.
Evolution of Exfiltrator-22
The first variant appeared in the wild on or before November 27, 2022, and roughly 10 days later, a Telegram channel was set up to advertise the framework with an aggressive marketing strategy.
In December 2022, the threat actors announced a new feature that offers traffic concealment on compromised devices, indicating that it was under active development.
This year in January, its creators announced that EX-22 is 87% ready for use, and is available for a subscription for $1,000 per month and $5,000 for lifetime access with continuous updates and support.
In February, the threat actors posted two demonstration videos on their YouTube channel to showcase EX-22’s lateral movement and ransomware-spreading capabilities.
Spreading ransomware and evading detection
According to CYFIRMA researchers, the subscribers of the tool are provided with an admin login panel to access the Ex-22 server, hosted on a bulletproof VPS.
The tool can be used to establish a reverse shell with elevated privileges, upload files to the breached system, download files from the host to the C2, and activate a keylogger, a ransomware module, or a worm module on the infected device.
It can capture screenshots, start a live VNC session for real-time access on the compromised device, gain higher privileges, establish persistence between system reboots, and extract data from the LSASS and authentication tokens.
It can generate cryptographic hashes of files on the host to help closely monitor file locations and content change events and fetch the list of running processes.
Additionally, attackers can set scheduled tasks, update agents to a new version, change a campaign's configuration, or create new campaigns.
The framework claims to be fully undetectable by every antivirus and EDR vendor.
Malware attribution
Experts found similarities betweenLockBit 3.0 and EX-22 samples.
EX-22 and LockBit 3.0 both use the TOR obfuscation plugin Meek and domain fronting to hide malicious traffic inside legitimate HTTPS connections to reputable platforms.
Both use the same network infrastructure for concealing C2 traffic.
Conclusion
Experts concluded with high confidence that EX-22 is created by highly sophisticated threat actors. Experts suspect that this fully loaded tool having low detection rates may get good traction among adversaries. To stay protected, experts recommend implementing multi-layered security with real-time detection and prevention abilities.