mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-30 02:37:17 +00:00
[ADD] x2 new banker - Backswap, Karius
This commit is contained in:
parent
f414acc6ae
commit
b382425d9c
1 changed files with 25 additions and 3 deletions
|
@ -1,6 +1,6 @@
|
||||||
{
|
{
|
||||||
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
|
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
|
||||||
"name": "Banker",
|
"description": "A list of banker malware.",
|
||||||
"source": "Open Sources",
|
"source": "Open Sources",
|
||||||
"version": 8,
|
"version": 8,
|
||||||
"values": [
|
"values": [
|
||||||
|
@ -583,11 +583,33 @@
|
||||||
"description": "It's a Trojan that includes banking site web injections and stealer functions. It consists of a downloader component that downloads an encrypted file containing the main DLL. The DLL, in turn, connects using raw TCP connections to port 443 and downloads additional modules (i.e. VNCDLL.dll, StealerDLL.dll, ProxyDLL.dll)",
|
"description": "It's a Trojan that includes banking site web injections and stealer functions. It consists of a downloader component that downloads an encrypted file containing the main DLL. The DLL, in turn, connects using raw TCP connections to port 443 and downloads additional modules (i.e. VNCDLL.dll, StealerDLL.dll, ProxyDLL.dll)",
|
||||||
"value": "DanaBot",
|
"value": "DanaBot",
|
||||||
"uuid": "844417c6-a404-4c4e-8e93-84db596d725b"
|
"uuid": "844417c6-a404-4c4e-8e93-84db596d725b"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://www.cert.pl/news/single/analiza-zlosliwego-oprogramowania-backswap/",
|
||||||
|
"https://www.welivesecurity.com/2018/05/25/backswap-malware-empty-bank-accounts/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"description": "The banker is distributed through malicious email spam campaigns. Instead of using complex process injection methods to monitor browsing activity, the malware hooks key Windows message loop events in order to inspect values of the window objects for banking activity. The payload is delivered as a modified version of a legitimate application that is partially overwritten by the malicious payload",
|
||||||
|
"value": "Backswap",
|
||||||
|
"uuid": "ea0b5f45-6b56-4c92-b22b-0d84c45160a0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"meta": {
|
||||||
|
"refs": [
|
||||||
|
"https://research.checkpoint.com/banking-trojans-development/"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"description": "Trojan under development and already being distributed through the RIG Exploit Kit. Observed code similarities with other well-known bankers such as Ramnit, Vawtrak and TrickBot. Karius works in a rather traditional fashion to other banking malware and consists of three components (injector32\\64.exe, proxy32\\64.dll and mod32\\64.dll), these components essentially work together to deploy webinjects in several browsers.",
|
||||||
|
"value": "Karius",
|
||||||
|
"uuid": "a088c428-d0bb-49c8-9ed7-dcced0c74754"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"authors": [
|
"authors": [
|
||||||
"Unknown"
|
"Unknown",
|
||||||
|
"raw-data"
|
||||||
],
|
],
|
||||||
"type": "banker",
|
"type": "banker",
|
||||||
"description": "A list of banker malware."
|
"name": "Banker"
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue