[jpshare]A New technique used by Malware authors by Creating More unwanted junk file embedded with Malicious payload which leads to Avoid Detection by AV. Those unwanted Garbage files contains more than 100 MB junk files.
According to the Researchers from Kaspersky ,attacker has been using the XXMM malware toolkit and this sample has a very big overlay of junk data and 20 other similar samples are collected by YARA Rules.
This Malware identified as a Trojan loader which leads to Open a Backdoor in Victim Machine and the Backdoor name is Discovered as a “wali”
config strings with “[wali]” [souce :Kaspersky]
its contains more then 100 MB of non related junk files is the Reason Behind of the Wali loader’s big Size Backdoor .
According to Researchers ShadowWali was an earlier version of Wali. The fact that ShadowWali only supported 32-bit architectures, while Wali runs on both 32-bit and 64-bit systems.
The wali loader is installed onto the victim’s machine when the overlay data is generated by the wali dropper.
“Wali dropper1 checks the CPU architecture. If the CPU is 64-bit, this malware decrypts the 64-bit version of the wali loader from resource id 101. Otherwise, it decrypts the 32-bit version of the wali loader from resource id 102″
Based Upon the Random Values Malware junk size may Differ betweek 50 MB to 200 MB.
Some of sample Malware Detected by Kaspersky,
Once ShadowWali or Wali are installed, the malware injects itself into other processes.
In most infections, the process of choice has been Internet Explorer (iexplorer.exe), but there have been cases where the malware was injected into Windows Explorer (explorer.exe) and the Local Security Authority Subsystem Service (lsass.exe).
Also Researchers said, executable malwares disguised as movie files and ISO files spread over torrents, which in these cases, the malware size is inflated to a few gigabytes in order to mimic true content .
Millions of Smartphones are Vulnerable to inject Backdoor via open Ports
A new IoT Botnet is Spreading over HTTP Port 81 and Exploit the Vulnerability in Security Cameras
Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar
IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler…
Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of…
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
View Comments
i just love to read your posts . thanks for the info
Hi James.. Thanks for your valuable feedback... Please keep support & following us for future updates..