A laptop with a warning symbol on its screen is surrounded by red binary code. The text Lokibot Malware is displayed in a bold, orange and white banner at the bottom of the image.

New .NET Malware Hides Lokibot Malware within PNG/BMP Files to Evade Detection

By Published On: November 20, 2025

 

Navigating the Evolving Threat Landscape: Lokibot’s Steganographic Resurgence

The ingenuity of cyber adversaries never ceases to challenge even the most robust defenses. A recent development highlights this persistent innovation: a new .NET-based malware loader that ingeniously conceals the notorious Lokibot information-stealing trojan within seemingly innocuous image files like PNGs and BMPs. This sophisticated multi-stage delivery system leverages steganography, a technique that embeds hidden data inside legitimate-looking files, significantly complicating detection for traditional security tools.

Understanding this evolving threat is crucial for cybersecurity professionals. The ability of malware to bypass conventional security measures by masquerading as benign data underscores the need for continuous vigilance and adaptive defense strategies.

Lokibot’s Modus Operandi: Steganography as a Cloak

Lokibot, a long-standing information stealer, has consistently adapted its delivery methods to evade detection. Its latest incarnation showcases a particularly clever approach. The .NET-based loader acts as the initial intrusion vector. Once executed, instead of directly dropping the Lokibot payload, it extracts the hidden malware from within an image file present on the compromised system or downloaded as part of the attack chain.

This method significantly enhances the malware’s stealth. Security solutions relying on signature-based detection or even behavioral analysis might struggle to identify malicious code hidden within the pixel data of an image. The technique exploits the trust placed in common file types, making the initial stages of the attack remarkably subtle.

The Multi-Stage Delivery System: A Deeper Dive

The attack vector likely begins with a phishing email or a compromised website delivering the initial .NET loader. This loader, often designed to appear benign, initiates the decryption and execution process. Here’s a simplified breakdown of the stages:

  • Initial Compromise: The user executes the .NET loader.
  • Image Acquisition: The loader either finds a pre-existing image on the system or downloads a specially crafted PNG or BMP file.
  • Steganographic Extraction: The loader employs specific algorithms to extract the encrypted Lokibot payload hidden within the image’s pixel data.
  • Decryption and Execution: The extracted payload is decrypted and then injected into a legitimate process, allowing Lokibot to begin its information-gathering activities.

This multi-stage approach, particularly the use of steganography, creates a complex kill chain that requires advanced threat hunting and behavioral analysis to fully uncover.

Why Lokibot Remains a Persistent Threat

Lokibot (CVE-2019-17070, though more broadly an ongoing malware family) is renowned for its persistent ability to steal sensitive data, including:

  • Browser credentials and autofill data.
  • Cryptocurrency wallet information.
  • FTP client credentials.
  • Email client credentials.
  • Various other system and personal data.

Its effectiveness stems from its broad targeting capabilities and its developers’ constant efforts to innovate evasion techniques, as demonstrated by this new steganographic approach.

Remediation Actions: Strengthening Your Defenses

Countering sophisticated threats like steganographic Lokibot requires a multi-layered security strategy. Here are actionable steps to enhance your organization’s resilience:

  • Endpoint Detection and Response (EDR): Implement and configure EDR solutions to monitor for unusual process injection, memory anomalies, and file access patterns that might indicate steganographic extraction and payload execution.
  • Network Traffic Analysis: Employ network intrusion detection systems (NIDS) and intrusion prevention systems (NIPS) to detect suspicious outbound connections that Lokibot might initiate to exfiltrate stolen data.
  • Email Security Gateways: Strengthen email security to block phishing attempts designed to deliver the initial .NET loader. Implement DMARC, SPF, and DKIM.
  • User Awareness Training: Educate employees about the dangers of opening unsolicited attachments, even if they appear to be legitimate image files, and the importance of verifying sender identities.
  • Principle of Least Privilege: Enforce the principle of least privilege for all users and applications to limit the potential damage if an endpoint is compromised.
  • Regular Patch Management: Keep all operating systems, applications, and security software up to date to patch known vulnerabilities.
  • Advanced Threat Intelligence: Subscribe to and integrate threat intelligence feeds that provide information on emerging malware techniques and indicators of compromise (IoCs).

Tools for Detection and Analysis

Several tools can aid in detecting, analyzing, and mitigating threats leveraging similar techniques:

Tool Name Purpose Link
YARA Rules Signature-based detection of known malware patterns and specific file attributes. https://virustotal.github.io/yara/
IDA Pro / Ghidra Reverse engineering and static analysis of suspicious executables and loaders. https://hex-rays.com/ida-pro/ / https://ghidra-sre.org/
Volatility Framework Memory forensics for analyzing live or dumped memory to detect hidden processes and injected code. https://www.volatilityfoundation.org/
Snort / Suricata Network intrusion detection/prevention for monitoring network traffic for indicators of compromise. https://www.snort.org/ / https://suricata.io/
CyberChef A versatile tool for data manipulation, encoding/decoding, and basic steganography analysis. https://gchq.github.io/CyberChef/

Key Takeaways for Enhanced Cybersecurity

The emergence of a .NET malware loader leveraging steganography to deliver Lokibot underscores several critical points for organizations. Firstly, reliance on traditional detection methods alone is insufficient against sophisticated attackers. Secondly, the threat landscape continues to prioritize stealth and evasion, making behavioral analysis and robust endpoint security paramount. Finally, proactive measures, including stringent email security, user education, and advanced threat intelligence, are essential to defend against these evolving and increasingly covert threats.

 

Share this article

Leave A Comment