Malware - 2022(119)

DATE

NAME

 

CATEGORY

SUBCATEGORIES

9.7.22

Robin Worm

Raspberry Robin is a spreading threat, using specifically crafted Microsoft links (LNK files) to infect its victims. Cybereason observed delivery through file archives, removable devices (USB) or ISO files.

Malware

Raspberry

7.7.22

BPFDoor

BPFDoor is a passive backdoor used by a China-based threat actor. This backdoor supports multiple protocols for communicating with a C2 including TCP, UDP, and ICMP allowing the threat actor a variety of mechanisms to interact with the implant.

Malware

Linux

7.7.22

Symbiote Linux

Symbiote, a new “nearly impossible to detect” Linux malware, targeted financial sectors in Latin America—and the threat actors behind it might have links to Brazil. These findings were revealed in a recent report, a joint effort between the Blackberry Research Team and Dr. Joakim Kennedy, a security researcher with Intezer.

Malware

Linux

1.7.22

SessionManager

Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within IIS, a popular web server edited by Microsoft. And we didn’t come back empty-handed…

Malware

Backdoor

29.6.22

YTStealer

YTStealer Malware: “YouTube Cookies! Om Nom Nom Nom”

Malware

Stealer

28.6.22

ZuoRAT

A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign targeting North American and European networks.

Malware

RAT

28.6.22

Revive

In June 2022, a new Android banking trojan was discovered by the Cleafy TIR team. Since the lack of information and the absence of a proper nomenclature of this malware family, we decided to dub it as Revive to better track this family inside our internal Threat Intelligence taxonomy.

Malware

Malware

27.6.22

Matanbuchus Loader Resurfaces

Recently, Cyble Research Labs came across a Twitter post where a researcher observed this malware spreading through spam campaigns. Additionally, it downloads Cobalt Strike Beacons as payloads in compromised systems.

Malware

Malware loader

25.6.22

LemonDuck Crypto-Mining Malware

The Cybereason GSOC Managed Detection and Response (MDR) Team is investigating a series of recent infections with the LemonDuck malware.

Malware

Crypto-Mining

25.6.22

SolarMarker Backdoor

The GSOC Cybereason Managed Detection and Response (MDR) Team is investigating a series of recent infections that use the SolarMarker backdoor.

Malware

Backdoor

25.6.22

PYSA Ransomware

In this Threat Analysis Report, the GSOC investigates the PYSA ransomware. The PYSA ransomware came into awareness earlier this year when the Federal Bureau of Investigation (FBI) reported on the ransomware’s increased activity and high damaging impact.

Malware

Ransomware 

25.6.22

Snake Infostealer

This report provides an overview of key information-stealing features of the Snake malware and discusses similarities that we discovered in the staging mechanisms of samples from Snake and two common information-stealing malware programs, FormBook and Agent Tesla.

Malware

Stealer

25.6.22

PowerLess Trojan

Towards the end of 2021, multiple attacks were carried out exploiting the notorious Microsoft Exchange Server vulnerabilities chained together and referred to as ProxyShell, which ultimately enabled multiple threat actors to deploy malware on their targets’ networks. There have been several reports detailing the exploitation of these vulnerabilities by Iranian state sponsored threat actors, among them the Phosphorus APT group carrying out ransomware attacks.

Malware

Backdoor

25.6.22

StrifeWater RAT

Following recently published research detailing the group’s TTPs including their main tools “PyDcrypt” and “DCSrv”, the Cybereason Nocturnus team discovered a previously unidentified Remote Access Trojan (RAT) in the Moses Staff arsenal dubbed StrifeWater.

Malware

RAT

16.6.22

Sality

Modern Sality variants also have the ability to communicate over a peer-to-peer (P2P) network, allowing an attacker to control a botnet of Sality-infected machines.

Malware

Rootkit/Backdoor

14.6.22

Syslogk

Rootkits are dangerous pieces of malware. Once in place, they are usually really hard to detect. Their code is typically more challenging to write than other malware, so developers resort to code reuse from open source projects.

Malware

Linux

14.6.22

Warzone RAT

Warzone aims to be the Remote Access Trojan (RAT) of choice for aspiring miscreants on a budget. It is sold on a publicly available website as opposed to on the dark web, as a Malware-as-a-Service (MaaS) subscription-based platform.

Malware

RAT

14.6.22

Snake Keylogger

Snake Keylogger is a malware developed using .NET. It first appeared in late 2020 and focused on stealing sensitive information from a victim’s device, including saved credentials, the victim’s keystrokes, screenshots of the victim’s screen, and clipboard data.

Malware

Keylogger

14.6.22

Arkei

Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA

Malware

RAT

14.6.22

Rekoobe

A Trojan for Linux intended to infect machines with the SPARC architecture and Intel x86, x86-64 computers. The Trojan’s configuration data is stored in a file encrypted with XOR algorithm

Malware

Linux

14.6.22

PureCrypter

PureCrypter has been growing in popularity with a number of information stealers and remote access trojans (RATs) being deployed by it. ThreatLabz has observed PureCrypter being used to distribute the following malware families:

Malware

RAT

14.6.22

SeaFlower

How SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phrase

Malware

Android/iOS

14.6.22

PingPull

Unit 42 recently identified a new, difficult-to-detect remote access trojan named PingPull being used by GALLIUM, an advanced persistent threat (APT) group.

Malware

Malware

14.6.22

MicroBackdoor

Open-source lightweight backdoor for C2 communication.

Malware

Malware

6.6.22

SVCReady

A previously unknown malware loader named SVCReady has been discovered in phishing attacks, featuring an unusual way of loading the malware from Word documents onto compromised machines.

Malware

Malware

5.6.22

WinDealer

An "extremely sophisticated" Chinese-speaking advanced persistent threat (APT) actor dubbed LuoYu has been observed using a malicious Windows tool called WinDealer that's delivered by means of man-on-the-side attacks.

Malware

Malware espionage

4.6.22

FakeUpdates

FAKEUPDATES is a downloader written in JavaScript that communicates via HTTP. Supported payload types include executables and JavaScript. It writes the payloads to disk prior to launching them.

Malware

Malware

31.5.22

IoT malware EnemyBot

Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices

Malware

Malware

29.5.22

ChromeLoader

ChromeLoader might seem like a run-of-the-mill browser hijacker, but its peculiar use of PowerShell could spell deeper trouble.

Malware

Malware

29.5.22

Browser Automation Frameworks
for Malicious Activities

Lowering the Barrier of Entry for Malicious Actors.Free-to-use browser automation framework creates thriving criminal community

Malware

Malware

20.5.22

XorDdos

XorDdos depicts the trend of malware increasingly targeting Linux-based operating systems, which are commonly deployed on cloud infrastructures and Internet of Things (IoT) devices. By compromising IoT and other internet-connected devices, XorDdos amasses botnets that can be used to carry out distributed denial-of-service (DDoS) attacks.

Malware

Linux

20.5.22

Cytrox

Google's Threat Analysis Group (TAG) on Thursday pointed fingers at a North Macedonian spyware developer named Cytrox for developing exploits against five zero-day (aka 0-day) flaws, four in Chrome and one in Android, to target Android users.

Malware

Android Spyware

20.5.22

NukeSped Backdoor

The North Korea-backed Lazarus Group has been observed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the NukeSped (aka Manuscrypt) implant against targets located in its southern counterpart.

Malware

Malware

20.5.22

Vidar Malware

In April 2022, ThreatLabz discovered several newly registered domains, which were created by a threat actor to spoof the official Microsoft Windows 11 OS download portal. We discovered these domains by monitoring suspicious traffic in our Zscaler cloud.

Malware

Malware

20.5.22

SuspSQLUsage

Microsoft on Tuesday warned that it recently spotted a malicious campaign targeting SQL Servers that leverages a built-in PowerShell binary to achieve persistence on compromised systems.

Malware

SQL Malware

18.5.22

Facestealer

Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys

Malware

Android

14.5.22

Saitama backdoor

Researchers from Malwarebytes and Fortinet FortiGuard Labs attributed the campaign to an Iranian cyber espionage threat actor tracked under the moniker APT34, citing resemblances to past campaigns staged by the group.

Malware

Backdoor

12.5.22

Bitter APT

 

Malware

RAT

12.5.22

Nerbian RAT

The newly identified Nerbian RAT leverages multiple anti-analysis components spread across several stages, including multiple open-source libraries. It is written in operating system (OS) agnostic Go programming language, compiled for 64-bit systems, and leverages several encryption routines to further evade network analysis.

Malware

RAT

11.5.22

Prynt Stealer

Cyble research labs discovered a new Infostealer named Prynt Stealer. The stealer is new on the cybercrime forums and comes with various capabilities. Along with stealing the victim’s data, this stealer can also perform financial thefts using a clipper and keylogging operations. Additionally, it can target 30+ Chromium-based browsers, 5+ Firefox-based browsers, and a range of VPN, FTP, Messaging, and Gaming apps.

Malware

Stealer

11.5.22

Saintstealer

During our routine threat-hunting exercise, Cyble Research Labs came across a C# .NET-based information stealer developed by the Saint gang. The activities of Saintstealer can be traced back as far as November 2021. The file is not packed and has multiple functionalities to steal credentials and system information.

Malware

Stealer

11.5.22

Bumblebee malware

Identified by Proofpoint as the threat actor behind the Contact Forms campaign, TA578 also appears to be pushing ISO files for Bumblebee malware through thread-hijacked emails.

Malware

Malware

10.5.22

Octopus Backdoor

Last week, I found another interesting Word document that delivered an interesting malicious script to potential victims. Usually, Office documents carry VBA macros that are activated using a bit of social engineering (the classic yellow ribbon) but this time, the document did not contain any malicious code.

Malware

Backdoor

10.5.22

DarkCrystal RAT

DCRat (also known as DarkCrystal RAT) is a commercial Russian backdoor that was first released in 2018, before being redesigned and relaunched a year later. Notably, this threat appears to have been developed and maintained by a single person going by the pseudonyms of “boldenis44,” “crystalcoder,” and Кодер (“Coder”).

Malware

RAT

10.5.22

Joker malware

Joker, a repeat offender, refers to a class of harmful apps that are used for billing and SMS fraud, while also performing a number of actions of a malicious hacker's choice, such as stealing text messages, contact lists, and device information.

Malware

Android

10.5.22

Jester Stealer

It is established that the mentioned archive contains the SFX file of the same name, which, in turn, contains the malicious program CredoMap_v2. The difference between this version of the styler and the previous one is that it uses the HTTP protocol to filter data.

Malware

Stealer

8.5.22

Pipe-based

In February 2022 we observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious campaign. It allows the “fileless” last stage Trojan to be hidden from plain sight in the file system.

Malware

Fileless

8.5.22

Raspberry Robin malware

 

Malware

Malware

8.5.22

PrivateLoader

Pay-per-install (PPI) malware services have been an integral part of the cybercrime ecosystem for a considerable amount of time. A malware operator provides payment, malicious payloads and targeting information, and those responsible for running the service outsource the distribution and delivery.

Malware

Pay-per-install (PPI)
malware

8.5.22

LockBit

 

Malware

Ransomware 

8.5.22

Agent Tesla

A .NET based keylogger and RAT readily available to actors. Logs keystrokes and the host's clipboard and beacons this information back to the C2.

Malware

Ransomware 

8.5.22

BitRAT

 

Malware

Malware RAT

8.5.22

NjRAT

RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID.

Malware

Malware RAT

8.5.22

Dridex

OxCERT blog describes Dridex as "an evasive, information-stealing malware variant; its goal is to acquire as many credentials as possible and return them via an encrypted tunnel to a Command-and-Control (C&C) server. These C&C servers are numerous and scattered all over the Internet, if the malware cannot reach one server it will try another.

Malware

Banking Trojan

8.5.22

Kronos

 

Malware

Malware

8.5.22

TrickBot

A financial Trojan believed to be a derivative of Dyre: the bot uses very similar code, web injects, and operational tactics. Has multiple modules including VNC and Socks5 Proxy. Uses SSL for C2 communication.

Malware

Bot

8.5.22

NanoCore

Nanocore is a Remote Access Tool used to steal credentials and to spy on cameras. It as been used for a while by numerous criminal actors as well as by nation state threat actors.

Malware

RAT

8.5.22

Remcos

Remcos (acronym of Remote Control & Surveillance Software) is a Remote Access Software used to remotely control computers.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.

Malware

RAT

8.5.22

CryptBot

A typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2.

Malware

Cryptbot

8.5.22

Formbook

FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware.

Malware

Crypt

8.5.22

DanaBot

Proofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims.

Malware

Bot

8.5.22

GCleaner

 

Malware

Malware

8.5.22

Raccoon

Raccoon is a stealer and collects "passwords, cookies and autofill from all popular browsers (including FireFox x64), CC data, system information, almost all existing desktop wallets of cryptocurrencies".

Malware

cryptocurrencies

8.5.22

Vidar

Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.

Malware

Stealer

8.5.22

RedLine Stealer

RedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information.

Malware

Stealer

8.5.22

SmokeLoader

The SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity.

Malware

Backdoor

8.5.22

NetDooka Malware

We recently encountered a fairly sophisticated malware framework that we named NetDooka after the names of some of its components. The framework is distributed via a pay-per-install (PPI) service and contains multiple parts, including a loader, a dropper, a protection driver, and a full-featured remote access trojan (RAT) that implements its own network communication protocol.

Malware

Malware

5.5.22

DarkWatchman

A new JavaScript-based remote access Trojan (RAT) propagated via a social engineering campaign has been observed employing sneaky "fileless" techniques as part of its detection-evasion methods to elude discovery and analysis.

Malware

Javascript/Backdoor

5.5.22

Remcos RAT

I haven't really looked into Remcos RAT lately, but I found an email with a password-protected Excel file attached to it.Further investigation revealed Remcos RAT 3.x activity remarkably similar to an infection chain reported by Fortinet last month. Today's diary reviews a Remcos RAT infection in my lab on Wednesday 2022-05-04.

Malware

Malware RAT

30.4.22

Bumblebee

Starting in March 2022, Proofpoint observed campaigns delivering a new downloader called Bumblebee. At least three clusters of activity including known threat actors currently distribute Bumblebee.

Malware

Malware

30.4.22

RedLine Stealer

At the start of the year, Bitdefender noticed a RIG Exploit Kit campaign using CVE-2021-26411 exploits found in Internet Explorer to deliver RedLine Stealer, a low-cost password stealer sold on underground forums.

Malware

Malware Stealer

30.4.22

PlugX

The threat group’s targeting shift could reflect a change in China’s intelligence collection requirements due to the war in Ukraine.

Malware

Malware

30.4.22

Package Planting

Aqua’s Team Nautilus found a logical flaw in npm that allows threat actors to masquerade a malicious package as legitimate and trick unsuspecting developers into installing it.

Malware

Malware

27.4.22

GOLDBACKDOOR

GOLDBACKDOOR, an artifact that shares technical overlaps with another malware named BLUELIGHT, which has been previously linked to the group.

Malware

Malware

27.4.22

Fodcha

A rapidly expanding malware is entrapping routers, DVRs, and servers all over the web in order to launch Distributed Denial-of-Service (DDoS) attacks on over 100 victims every day.

Malware

Malware

27.4.22

BotenaGo

BotenaGo is a relatively new malware written in Golang, Google’s open-source programming language.

Malware

Malware

23.4.22

More_eggs

More_eggs is a JavaScript backdoor used by the Cobalt group.

Malware

Javascript/Backdoor

18.4.22

SolarMarker malware

 

Malware

Infostealer, Backdoor

16.4.22

RedLine Stealer

 

Malware

Malware Stealer

16.4.22

INCONTROLLER

 

Malware

ICS Malware

16.4.22

PIPEDREAM

 

Malware

ICS Malware

14.4.22

Tarrask

 

Malware

Malware

14.4.22

Industroyer malware

 

Malware

Malware

14.4.22

Prometheus TDS

 

Malware

Malware Stealer

14.4.22

FFDroider

 

Malware

Malware Stealer

10.4.22

BIOPASS RAT

 

Malware

Malware RAT

10.4.22

ShadowPad Malware

 

Malware

Malware

9.4.22

Octo

 

Malware

Banking Malware

9.4.22

Denonia

 

Malware

Malware

9.4.22

SharkBot

 

Malware

Banking Malware

9.4.22

Colibri

 

Malware

Malware

6.4.22

Process Manager

 

Malware

Spyware

6.4.22

El Machete, Lyceum, and SideWinder

 

Malware

Malware espionage

6.4.22

BlackGuard

 

Malware

Malware Stealer

2.4.22

AcidRain

 

Malware

Data Wiper

2.4.22

DoubleZero

 

Malware

Data Wiper

2.4.22

CaddyWiper

 

Malware

Data Wiper

2.4.22

WhisperKill

 

Malware

Data Wiper

2.4.22

Gh0st RAT 

 

Malware

RAT

2.4.22

DeFiChain

Malware

Crypto Malware

2.4.22

Jupyter

 

Malware

Malware

2.4.22

Scarab

 

Malware

Ransomware

2.4.22

Mars Stealer

 

Malware

Malware Stealer

2.4.22

Oski Stealer

 

Malware

Malware Stealer

2.4.22

ObliqueRAT

 

Malware

RAT

2.4.22

CapraRAT

 

Malware

RAT

2.4.22

Verblecon

Malware

Crypto Malware

2.4.22

Wslink

 

Malware

Malware

28.3.22

FatalRat

 

Malware

RAT

28.3.22

MustangPanda

 

Malware

Backdoor

1.3.22

TeaBot

 

Malware

Banking/RAT Malware

1.3.22

WhisperGate

 

Malware

Destructive Malware

1.3.22

IsaacWiper

 

Malware

Data Wiper

1.3.22

HermeticWiper

 

Malware

Data Wiper

1.3.22

AnchorDNS

 

Malware

DNS Backdoor

1.3.22

TrickBot

 

Malware

BotNet

1.3.22

FoxBlade

 

Malware

Data Wiper

1.3.22

Daxin Malware

 

Malware

Backdoor espionage