Transcript
Page 1: Malware's most wanted-zberp-the_financial_trojan
Page 2: Malware's most wanted-zberp-the_financial_trojan

ZBERPInside a Financial Trojan

Page 3: Malware's most wanted-zberp-the_financial_trojan

Your speakers today

Marion MarschalekSecurity Research Expert

Shelendra SharmaProduct Marketing Director

Page 4: Malware's most wanted-zberp-the_financial_trojan

Agenda

o What is ZBERPo Dissecting the malwareo Wrap-up and Q&A

Cyph

ort L

abs

T-sh

irt

Page 5: Malware's most wanted-zberp-the_financial_trojan

Threat Monitoring & Research team

________

24X7 monitoring for malware events

________

Assist customers with their Forensics and Incident Response

We enhance malware detection accuracy

________

False positives/negatives

________

Deep-dive research

We work with the security ecosystem

________

Contribute to and learn from malware KB

________

Best of 3rd Party threat data

Page 6: Malware's most wanted-zberp-the_financial_trojan

Banking Trojans

How Malware Became Greedy

Page 7: Malware's most wanted-zberp-the_financial_trojan

ZeusCitadelSpyEyeZitMoZeusVM/KINSCarberp... Zberp!

Source: https://www.mobigyaan.com

Page 8: Malware's most wanted-zberp-the_financial_trojan

ZeusCitadelSpyEyeZitMoZeusVM/KINSCarberp... Zberp!

Source: https://www.mobigyaan.com

Page 9: Malware's most wanted-zberp-the_financial_trojan

Source: https://zeustracker.abuse.ch/

Page 10: Malware's most wanted-zberp-the_financial_trojan

ZeusVM / KINS

o Born December 2011o Sold as a kit since 2013o Heavily based on Zeus code

http://blog.fox-it.com/2013/07/25/analysis-of-the-kins-malware/

Page 11: Malware's most wanted-zberp-the_financial_trojan

There Is No Honor Among Thieves

Page 12: Malware's most wanted-zberp-the_financial_trojan

KINS + Carberp = Zberp?

Code injection

Hooking technique

Infection routine

VM code

Steganografic configuration

Page 13: Malware's most wanted-zberp-the_financial_trojan

ZBERP

How Zeus and Kins and Carberp Merged

Page 14: Malware's most wanted-zberp-the_financial_trojan

What Makes ZBERP

o Steganography o Invisible persistenceo SSL CnC Communication o VMProtect Featureo New Hooking implementation

Page 15: Malware's most wanted-zberp-the_financial_trojan

System Infiltration

1. Drop executable in users %APP% folder

2. Create and execute a batch file to delete dropper

3. Maintain registry key for persistence

4. Inject payload to system processes

5. Download customized configuration

Page 16: Malware's most wanted-zberp-the_financial_trojan

System Infiltration

1. Drop executable in users %APP% folder

2. Create and execute a batch file to delete dropper

3. Maintain registry key for persistence

4. Inject payload to system processes

5. Download customized configuration

ZEUS

Page 17: Malware's most wanted-zberp-the_financial_trojan

1. Grab next opcode

2. Call opcode handler

Virtual Machine Code Execution

Page 18: Malware's most wanted-zberp-the_financial_trojan

1. Grab next opcode2. Call opcode handler

Virtual Machine Code Execution

KINS

Page 19: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

Page 20: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

Page 21: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

KINS

Page 22: Malware's most wanted-zberp-the_financial_trojan

Invisible Persistence

Thread for managing autorun key

...

Page 23: Malware's most wanted-zberp-the_financial_trojan

Invisible Persistence

Thread for managing autorun key

...KINS

Page 24: Malware's most wanted-zberp-the_financial_trojan

Code Injection Technique

Suspend – Inject – ResumeExecutable injection

Page 25: Malware's most wanted-zberp-the_financial_trojan

Code Injection Technique

Suspend – Inject – ResumeExecutable injection

CARBERP

Page 26: Malware's most wanted-zberp-the_financial_trojan

„Man-in-the-browser“

Page 27: Malware's most wanted-zberp-the_financial_trojan

ZBERP

„Man-in-the-browser“

Page 28: Malware's most wanted-zberp-the_financial_trojan

Key Take-awaysHow to Stay Safe

Page 29: Malware's most wanted-zberp-the_financial_trojan

Critical Questions

Zeus first appeared in 2007 – why are its derivates still so successful?

What is compromised on an infected machine?

How can mitigation be achieved?

Page 30: Malware's most wanted-zberp-the_financial_trojan

Zeus‘ Success

Modularity.

Flexibility.

Persistence.

Page 31: Malware's most wanted-zberp-the_financial_trojan

Potential Data Loss

Digital Identities

Critical Browser Data

Media

Sensitive Documents

Anything the botnet operator desires!

Page 32: Malware's most wanted-zberp-the_financial_trojan

Conclusions

o Don’t underestimate Zeus and its descendants.

o Check for presence of unfamiliar network callbacks.

o Use a professional grade APT solution to detect these Trojans.

Page 33: Malware's most wanted-zberp-the_financial_trojan

Q and A

o Information sharing and advanced threats resources

o Blogs on latest threats and findings

o Tools for identifying malware

Page 34: Malware's most wanted-zberp-the_financial_trojan

Thank You!

Page 35: Malware's most wanted-zberp-the_financial_trojan

Top Related