HomeCyber BalkansNew Dropper Utilizing JavaScript Causes Malware Infections

New Dropper Utilizing JavaScript Causes Malware Infections

Published on

spot_img

A recent study has revealed that JavaScript-based droppers are being used to distribute Bumblebee and IcedID malware, instead of the traditional PowerShell-based droppers. These two types of malware are widely associated with ransomware attacks.

Bumblebee is a modular loader that is primarily distributed through phishing campaigns. It is used to deliver payloads that are commonly associated with ransomware deployments. On the other hand, IcedID is a modular banking trojan that targets user financial information. It can also act as a dropper for other types of malware. This trojan uses a man-in-the-browser attack to steal financial information, including login credentials for online banking sessions.

The shift from PowerShell-based droppers to JavaScript-based droppers, as well as the transition of IcedID from a banking trojan to a malware loader, demonstrates how threat actors continuously adapt their techniques to evade detection.

In a recent technical analysis conducted by Deep Instinct’s Threat Research Lab, it was discovered that the JavaScript dropper, named PindOS, contains comments in Russian. Furthermore, it utilizes a unique user-agent string called “PindOS,” which may be a reference to the anti-American sentiment prevalent in Russia.

The PindOS dropper consists of a single function called “exec,” which takes four parameters. These parameters include the user-agent string to be used when downloading Bumblebee’s DLL, as well as the URLs from which the payload should be downloaded. When executed, the dropper attempts to download the payload from the specified URLs and execute it using either rundll32.exe or a combination of PowerShell and rundll32.exe. The downloaded payload is then saved to a specific location on the infected system.

The analysis also revealed that the new variant of Bumblebee shares similarities with the older version, such as the presence of a main function called “set path.” However, the new variant has four main export functions, whereas the older version only had two. This change suggests that the threat actors behind Bumblebee are continuously updating and evolving their malware.

Additionally, the new variant of Bumblebee includes “legitimate-looking” strings taken from the open-source FFmpeg project’s files. These strings are used as a distraction technique to make the malware appear more benign.

It is important for security teams to be aware of the indicators of compromise (IOCs) associated with Bumblebee and IcedID. Deep Instinct has provided updated IOCs on their GitHub page to assist in detecting and mitigating these threats.

Some of the IOCs for the Bumblebee dropper and payload include SHA256 hashes for specific files. Similarly, the IOCs for the IcedID dropper and payload also include SHA256 hashes.

By staying informed about the latest malware trends and understanding the tactics employed by threat actors, security teams can better protect their systems and networks from potential attacks. It is crucial to implement robust security measures and regularly update them to stay one step ahead of the evolving threat landscape.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...