Thursday, October 10, 2024
HomeComputer SecurityMalware Campaign -Distributing Ursnif Banking Malware Using Fileless Technique

Malware Campaign -Distributing Ursnif Banking Malware Using Fileless Technique

Published on

Ursnif malware also known as Gozi ISFB, is a variant of the original Gozi banking Trojan, which leaked its source code online in 2014.

The Ursnif sample comes from a Microsoft Word document containing a malicious VBA macro. The document is straightforward, simply displaying an image that asks the user to enable macros.

If macros are already permitted, the macro is executed automatically when opening the document via the AutoOpen function. The macro is mostly obfuscated code that executes math functions on data that does not relate to the next stage.

- Advertisement - EHA
Malicious VBA Macro

There is only one line in the macro that is important to executing the next stage, ultimately executing PowerShell.

The value of this property is the malicious PowerShell command, which is subsequently executed by the Shell function. The PowerShell command is base64 encoded, and is another PowerShell command that downloads Ursnif. Specifically, it downloads an executable from its C2 to the AppData directory and executes it.

Note, this is where the Exploit Prevention engine stops executing the downloaded file and provides us with alerts to investigate.

Malicious VBA Macro

Researchers from Cisco Talos discovered that this malware campaign uses an already well-known payload delivery method which employs Microsoft Word documents containing a malicious VBA macro.

  • The malicious VBA macro, if enabled, will automatically run using AutoOpen.
  • Otherwise, the malicious document displays an image prompting users to enable the macros feature.
  • The malicious VBA macro contains a single line which is important to execute the next infection stage by executing PowerShell.
  • This single line accesses the AlternativeText property of the Shapes object ‘j6h1cf’.
  • The value of this property is the malicious PowerShell command, which is eventually executed by the Shell function.
  • The malicious Powershell command is base64 encoded and it is the one that downloads the Ursnif executable from its C&C server to the AppData directory and executes it.
  • Once the Ursnif executable is downloaded and executed, registry data is created for the next stage of infection.
  • The PowerShell command for the next stage of infection exists in the value of the APHohema key.
  • This PowerShell command uses Windows Management Instrumentation Command-line (WMIC) to execute PowerShell, which extracts the value of the Authicap key to execute it.
  • Ursnif is a fan of “fileless” persistence which makes it difficult for traditional anti-virus techniques to filter out the C2 traffic from normal traffic. Additionally, Ursnif uses CAB files to compress its data prior to exfiltration, which makes this malware even more challenging to stop. To help with the detection of this malware, we are providing readers with a list of IOCs below that can help you stop Ursnif before it infects your network.  

C2 Server Domains: IOCs

levocumbut[.]com
rapworeepa[.]com
wegatamata[.]com
roevinguef[.]com
pivactubmi[.]com
biesbetiop[.]com
navectrece[.]com
yancommato[.]com
dewirasute[.]com
ptyptossen[.]com
mochigokat[.]com
tubpariang[.]com
zardinglog[.]com
abregeousn[.]com
aplatmesse[.]com
abeelepach[.]com
teomengura[.]com
allooalel[.]club
nublatoste[.]com
ledibermen[.]com
lootototic[.]com
acnessempo[.]com
usteouraph[.]com
izzlebutas[.]com
sfernacrif[.]com
isatawatag[.]com
duenexacch[.]com
kyllborena[.]com
bawknogeni[.]com
kicensinfa[.]com
uvuladitur[.]com

Related Read

A New Variant of Ursnif Banking Trojan Distributed Through Malicious Microsoft Word Documents

Ursnif Malware Variant Performs Malicious Process Injection in Memory using TLS Anti-Analysis Evasion Trick

Latest articles

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access

VMware has disclosed multiple vulnerabilities in its NSX product line that could potentially allow...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...