MalwareIntelligence is a site dedicated to research on all matters relating to anti-malware security, criminology computing and information security in general, always from a perspective closely related to the field of intelligence.


Financial institutions targeted by the botnet Zeus. Part one

As I said in previous post, zeus is one of the networks of zombie computers more important because of the large number of nodes that make up your network, and although its origin dates back to late 2007, now malware is exploiting a active and massive, expanding its coverage of attacks and fraudulent activities, each managed node through a web interface.

So much so that its activities are, in addition to the malicious action of infection, activate a whole array of malicious scripts whose purposes are channeled into massive infection of computers through trojans exploit various known vulnerabilities, phishing attacks under the method of cloning sites of different banks and global systems that offer online payments.

Knowing this fundamental point of view to focusing zeus in a high percentage of data theft, we assume that the specific question after reading these short paragraphs is: how does zeus get the information you need equipment victim?

The answer to this mystery lies in its configuration file, which is encrypted. Once decrypted, the contents of this configuration file is similar to the following real life example that shows the information contained in the file cfg.bin (MD5: 905dfab98b33e750bf78c8b29765279b):
Config version:
Loader url:
Server url:
Advanced config 1:
Advanced config 2:
Advanced config 3:
Advanced config 4:
Advanced config 5:
Advanced config 6:
Fake 1: 0 PG*||291351|
Fake 2: 0 PG*|http://centralet.c
Fake 3: 0 PG*||291351|
Fake 4: 0 PG*||291351|
Fake 5: 0 PG*||291351|
Fake 6: 0 PG*||291351|
Fake 7: 0 PG*||291351|
Fake 8: 0 PG*||291351|
Fake 9: 0 PG*||291351|
Fake 10: 0 PG*||291351|
Fake 11: 0 PG*||291351|
Fake 12: 0 PG*||291351|
Inject data 1: OK
Inject data 2: OK
Inject data 3: OK
Inject data 4: OK
Inject data 5: OK
Inject data 6: OK
Inject data 7: OK
Inject data 8: OK
Inject 1:*|GPL|*|*
Inject 2:*|GL|*|*
Inject 3:*|G|*|*
Inject 4:*|GP|*|*
Inject 5:*|GP|*|*
Inject 6:*/webscr?cmd=_account|GL|*|*
Inject 7:*/webscr?cmd=_login-done*|GL|*|*
Inject 8:*?ptns=acceso*|GP|*|*

In this way, and through the advanced configurations that exploit the victim computer, the trojan zeus obtain sensitive information.

Jorge Mieres

0 comentarios:

Post a Comment