malware's most wanted-zberp-the_financial_trojan

35

Upload: cyphort

Post on 15-Jan-2015

808 views

Category:

Technology


3 download

DESCRIPTION

Zbot + Carberp = Zberp, an online banking trojan that is reported to have impacted 450 financial institutions around the world in the first month since discovery. In addition to its malicious capabilities, the Zberp Trojan uses a combination of evasion techniques that it inherited from both the Zeus, also known as Zbot, and Carberp. Add in the ‘invisible persistence’ feature and you have one nasty piece of malware.

TRANSCRIPT

Page 1: Malware's most wanted-zberp-the_financial_trojan
Page 2: Malware's most wanted-zberp-the_financial_trojan

ZBERPInside a Financial Trojan

Page 3: Malware's most wanted-zberp-the_financial_trojan

Your speakers today

Marion MarschalekSecurity Research Expert

Shelendra SharmaProduct Marketing Director

Page 4: Malware's most wanted-zberp-the_financial_trojan

Agenda

o What is ZBERPo Dissecting the malwareo Wrap-up and Q&A

Cyph

ort L

abs

T-sh

irt

Page 5: Malware's most wanted-zberp-the_financial_trojan

Threat Monitoring & Research team

________

24X7 monitoring for malware events

________

Assist customers with their Forensics and Incident Response

We enhance malware detection accuracy

________

False positives/negatives

________

Deep-dive research

We work with the security ecosystem

________

Contribute to and learn from malware KB

________

Best of 3rd Party threat data

Page 6: Malware's most wanted-zberp-the_financial_trojan

Banking Trojans

How Malware Became Greedy

Page 7: Malware's most wanted-zberp-the_financial_trojan

ZeusCitadelSpyEyeZitMoZeusVM/KINSCarberp... Zberp!

Source: https://www.mobigyaan.com

Page 8: Malware's most wanted-zberp-the_financial_trojan

ZeusCitadelSpyEyeZitMoZeusVM/KINSCarberp... Zberp!

Source: https://www.mobigyaan.com

Page 9: Malware's most wanted-zberp-the_financial_trojan

Source: https://zeustracker.abuse.ch/

Page 10: Malware's most wanted-zberp-the_financial_trojan

ZeusVM / KINS

o Born December 2011o Sold as a kit since 2013o Heavily based on Zeus code

http://blog.fox-it.com/2013/07/25/analysis-of-the-kins-malware/

Page 11: Malware's most wanted-zberp-the_financial_trojan

There Is No Honor Among Thieves

Page 12: Malware's most wanted-zberp-the_financial_trojan

KINS + Carberp = Zberp?

Code injection

Hooking technique

Infection routine

VM code

Steganografic configuration

Page 13: Malware's most wanted-zberp-the_financial_trojan

ZBERP

How Zeus and Kins and Carberp Merged

Page 14: Malware's most wanted-zberp-the_financial_trojan

What Makes ZBERP

o Steganography o Invisible persistenceo SSL CnC Communication o VMProtect Featureo New Hooking implementation

Page 15: Malware's most wanted-zberp-the_financial_trojan

System Infiltration

1. Drop executable in users %APP% folder

2. Create and execute a batch file to delete dropper

3. Maintain registry key for persistence

4. Inject payload to system processes

5. Download customized configuration

Page 16: Malware's most wanted-zberp-the_financial_trojan

System Infiltration

1. Drop executable in users %APP% folder

2. Create and execute a batch file to delete dropper

3. Maintain registry key for persistence

4. Inject payload to system processes

5. Download customized configuration

ZEUS

Page 17: Malware's most wanted-zberp-the_financial_trojan

1. Grab next opcode

2. Call opcode handler

Virtual Machine Code Execution

Page 18: Malware's most wanted-zberp-the_financial_trojan

1. Grab next opcode2. Call opcode handler

Virtual Machine Code Execution

KINS

Page 19: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

Page 20: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

Page 21: Malware's most wanted-zberp-the_financial_trojan

Steganographic Configuration

KINS

Page 22: Malware's most wanted-zberp-the_financial_trojan

Invisible Persistence

Thread for managing autorun key

...

Page 23: Malware's most wanted-zberp-the_financial_trojan

Invisible Persistence

Thread for managing autorun key

...KINS

Page 24: Malware's most wanted-zberp-the_financial_trojan

Code Injection Technique

Suspend – Inject – ResumeExecutable injection

Page 25: Malware's most wanted-zberp-the_financial_trojan

Code Injection Technique

Suspend – Inject – ResumeExecutable injection

CARBERP

Page 26: Malware's most wanted-zberp-the_financial_trojan

„Man-in-the-browser“

Page 27: Malware's most wanted-zberp-the_financial_trojan

ZBERP

„Man-in-the-browser“

Page 28: Malware's most wanted-zberp-the_financial_trojan

Key Take-awaysHow to Stay Safe

Page 29: Malware's most wanted-zberp-the_financial_trojan

Critical Questions

Zeus first appeared in 2007 – why are its derivates still so successful?

What is compromised on an infected machine?

How can mitigation be achieved?

Page 30: Malware's most wanted-zberp-the_financial_trojan

Zeus‘ Success

Modularity.

Flexibility.

Persistence.

Page 31: Malware's most wanted-zberp-the_financial_trojan

Potential Data Loss

Digital Identities

Critical Browser Data

Media

Sensitive Documents

Anything the botnet operator desires!

Page 32: Malware's most wanted-zberp-the_financial_trojan

Conclusions

o Don’t underestimate Zeus and its descendants.

o Check for presence of unfamiliar network callbacks.

o Use a professional grade APT solution to detect these Trojans.

Page 33: Malware's most wanted-zberp-the_financial_trojan

Q and A

o Information sharing and advanced threats resources

o Blogs on latest threats and findings

o Tools for identifying malware

Page 34: Malware's most wanted-zberp-the_financial_trojan

Thank You!

Page 35: Malware's most wanted-zberp-the_financial_trojan