تقييم الموضوع :
  • 0 أصوات - بمعدل 0
  • 1
  • 2
  • 3
  • 4
  • 5
javascript malware : RETEFE
#1
Bug 
السلام عليكم ورحمت الله وبركاته

برنامج ضار شرس للاتحليل ...
تحليلا ممتعا.

 
إقتباس :Retefe Banking Malware Starts Leveraging EternalBlue
إقتباس :
28 de septiembre de 2017
A recent upgrade in the propagation capabilities of the Retefe banking Trojan (detected by Trend Micro as TROJ_RETEFE.ASUAN), as well as a few other developments in the banking malware landscape this month, shows how malware developers are ramping up their operations.
A recent report details how the developers behind Retefe added a new functionality to the malware that leverages EternalBlue (addressed by MS17-010), an infamous exploit connected to WannaCry and Petya ransomware attacks. Retefe is not the first banking Trojan to upgrade its propagation techniques—TrickBot and Emotet also took inspiration from the WannaCry and Petya outbreaks.
Security researchers noted that this new spate of Retefe campaigns has been spreading across different regions over the past few months. Typically this malware targets users in Austria, Sweden, Switzerland, Japan and recently the United Kingdom. The malware is distributed by malicious emails with “.lnk” shortcuts. If the attachment is opened and permission is given, a PowerShell command is triggered to download a self-extracting archive hosted on a remote server. Within the archive is an obfuscated JavaScript installer that implements the EternalBlue exploit, Eternal Blue then downloads a PowerShell script which installs Retefe. Most other banking Trojans use fake login pages on top of legitimate sites to steal credentials, but Retefe works by modifying the computer’s proxy settings and redirecting traffic to malicious sites hosted on remote servers.
Reports note that on September 20, the implementation of EternalBlue was modified and the module responsible for lateral spreading was removed, “thus avoiding an infinite spreading loop”.
This month’s banking malware landscape
Early this month, a new banking Trojan called Red Alert 2.0 was also ramping up operations and spreading through third-party app stores. This particular malware targets banking and social apps. Once installed, it uses an overlay to steal user credentials that it passes to a remote server. Red Alert 2.0 also blocks incoming calls from banks, presumably to block verification attempts and notifications.
This month also saw the BankBot malware updated. This malware is quite similar to Red Alert: it uses fake overlay screens to steal user credentials and is also capable of hijacking and intercepting SMS messages. Another consequence is that the malware can bypass SMS-based 2-factor authentication. The newer BankBot targets legitimate apps from banks based in 27 different countries, and ten United Arab Emirates (UAE) banking apps were added to their list.
Cybercriminals are constantly developing and adding functionality to their malware, and users should be equally vigilant. EternalBlue is a known exploit, and a patch has been available since March 2017. Users can stay protected by keeping their operating systems updated and using multilayered solutions.
Email and web gateway solutions such as Trend Micro™ Deep Discovery™ Email Inspector and InterScan™ Web Security can prevent malware from ever reaching end users. At the endpoint level, Trend Micro Smart Protection Suites deliver several capabilities like high fidelity machine learning, web reputation services, behavior monitoring, and application control, and vulnerability shielding that minimize the impact of this threat. Trend Micro Endpoint Sensor will also be effective in monitoring processes or events that trigger malicious activity.
Trend Micro™ Deep Discovery™ Inspector can detect connections to malicious C&C and help quickly identify the impacted machines on networks, while Trend Micro™ Deep Security™ can stop MS17-010 exploits from the network through its IPS technology.
For small businesses, Trend Micro Worry-Free Services Advanced offers cloud-based email gateway security through Hosted Email Security. Its endpoint protection also delivers several capabilities such as behavior monitoring and real-time web reputation in order detect and block ransomware.
All solutions are powered by XGen™ endpoint security, which infuses high-fidelity machine learning with other detection technologies and global threat intelligence for comprehensive protection against advanced malware.
Publicado en Cybercrime & Digital Threats, Trojan
SOURCE
إقتباس :
trendmicro.com/vinfo/es/security/news/cybercrime-and-digital-threats/retefe-banking-malware-starts-leveraging-eternalblue
DOWNLOAD
إقتباس :
malshare.com/sample.php?action=detail&hash=9b8771374f02f0357e23b312b6793a86 
أعضاء أعجبوا بهذه المشاركة :
#2
(14-05-2024, 12:48 PM)[email protected] كتب : برنامج ضار شرس للاتحليل ...
 وعليكم السلام ورحمة الله وبركاته. شكرًا لمشاركة هذا المقال. يظهر أن البرنامج الضار Retefe Banking Trojan قام بتحديث قدرات انتشاره من خلال استغلال ثغرة EternalBlue المعروفة، التي كانت مرتبطة بهجمات WannaCry وPetya ransomware. هذا التحديث يعكس كيف يعمل مطورو البرمجيات الخبيثة على تعزيز عملياتهم. البرنامج يهدف عادةً لمستخدمين في مناطق معينة مثل النمسا والسويد وسويسرا واليابان وحديثًا المملكة المتحدة، ويتم توزيعه عبر رسائل بريد إلكتروني ضارة تحتوي على اختصارات ".lnk". عند فتح المرفق وإعطاء الإذن، يتم تشغيل أمر PowerShell لتنزيل أرشيف يحتوي على مثبت JavaScript محجوب ينفذ استغلال EternalBlue، الذي يقوم بتنزيل نص PowerShell يقوم بتثبيت Retefe.
بالإضافة إلى ذلك، هناك ازدياد في النشاطات المتعلقة ببرمجيات البرمجيات الخبيثة البنكية الأخرى مثل Red Alert 2.0 و BankBot، والتي تستهدف تطبيقات المصارف وتقوم بسرقة بيانات الاعتماد للمستخدمين.
المقال يشير أيضًا إلى أن الحماية تكمن في البقاء على اطلاع بتحديثات النظام واستخدام حلول متعددة الطبقات مثل بوابات البريد الإلكتروني والويب والحماية على مستوى النهاية. تقدم حلول Trend Micro عدة قدرات للحماية من هذه الهجمات بما في ذلك استخدام تعلم الآلة عالي الدقة وخدمات سمعة الويب ورصد السلوك وضبط التطبيقات والحماية من الثغرات.
شكرًا مرة أخرى لمشاركتك هذا المقال المفيد!
أعضاء أعجبوا بهذه المشاركة :


التنقل السريع :


يقوم بقرائة الموضوع: بالاضافة الى ( 1 ) ضيف كريم