"value":"On November 2015, Kaspersky Lab researchers identified ATMZombie, a banking Trojan that is considered to be the first malware to ever steal money from Israeli banks. It uses insidious injection and other sophisticated and stealthy methods. The first method, dubbed \u00e2\u20ac\u0153proxy-changing\u00e2\u20ac\u009d, is commonly used for HTTP packets inspections. It involves modifying browser proxy configurations and capturing traffic between a client and a server, acting as Man-In-The-Middle.\r\n\r\nAlthough this is efficient for testing, streaming bank details isn\u00e2\u20ac\u2122t as easy. Banks are using encrypted channels, signed with authorized certificates, to prevent the data from being streamed in clear-text. The attackers, however, realized the missing piece and have since issued a certificate of their own, which is embedded in the dropper and is inserted in the root CA list of common browsers in the victim\u00e2\u20ac\u2122s machine.\r\n\r\nThe method of using a \u00e2\u20ac\u0153proxy-changer\u00e2\u20ac\u009d Trojan to steal bank credentials has been around since the end of 2005, and is being actively used by Brazilian cybercriminals; however, it wasn\u00e2\u20ac\u2122t until 2012 that Kaspersky Lab researchers compiled a full attack analysis. \u00e2\u20ac\u0153In Brazil malicious PAC files in Trojan bankers have been increasingly common since 2009, when several families such as Trojan.Win32.ProxyChanger started to force the URLs of PAC files in the browser of infected machines.\u00e2\u20ac\u0153, said Fabio Assolini, Senior Security Researcher at GReAT Kaspersky Lab, in his article."
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743528",
"to_ids":true,
"type":"domain",
"uuid":"56d42468-6254-433d-b79d-18f2950d210f",
"value":"retsback.com"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743528",
"to_ids":true,
"type":"domain",
"uuid":"56d42468-e430-42c1-af5f-18f2950d210f",
"value":"updconfs.com"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743529",
"to_ids":true,
"type":"domain",
"uuid":"56d42469-9174-4954-8e6a-18f2950d210f",
"value":"systruster.com"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743529",
"to_ids":true,
"type":"domain",
"uuid":"56d42469-07d4-412d-9308-18f2950d210f",
"value":"msupdcheck.com"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743544",
"to_ids":true,
"type":"ip-dst",
"uuid":"56d42478-dd34-408f-9189-49d1950d210f",
"value":"91.230.211.206"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743544",
"to_ids":true,
"type":"ip-dst",
"uuid":"56d42478-5890-4c55-b27c-49d1950d210f",
"value":"185.86.77.153"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743545",
"to_ids":true,
"type":"ip-dst",
"uuid":"56d42479-9f50-4c3f-978c-49d1950d210f",
"value":"91.215.154.90"
},
{
"category":"Network activity",
"comment":"",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743545",
"to_ids":true,
"type":"ip-dst",
"uuid":"56d42479-5f9c-42dd-a40d-49d1950d210f",
"value":"88.214.236.121"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zym",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743629",
"to_ids":true,
"type":"md5",
"uuid":"56d424cd-0a88-4d49-aedb-18f1950d210f",
"value":"6d11090c78e6621c21836c98808ff0f4"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyt",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743630",
"to_ids":true,
"type":"md5",
"uuid":"56d424ce-e0bc-4609-8eea-18f1950d210f",
"value":"4c5b7a8187475be251d05655edcaccbe"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyk",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743631",
"to_ids":true,
"type":"md5",
"uuid":"56d424cf-09c0-46b9-8200-18f1950d210f",
"value":"c0201ab2a45bc0e17ebd186059d5a59e"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyl",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743631",
"to_ids":true,
"type":"md5",
"uuid":"56d424cf-0fa0-405a-b234-18f1950d210f",
"value":"47b316e3227d618089eb1625c4202142"
},
{
"category":"Payload delivery",
"comment":"PAC",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743632",
"to_ids":true,
"type":"md5",
"uuid":"56d424d0-2454-4f64-b5df-18f1950d210f",
"value":"84bb5a77e28b3539a8022bc3612d4f4c"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyp",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743632",
"to_ids":true,
"type":"md5",
"uuid":"56d424d0-2d60-4f0c-84ed-18f1950d210f",
"value":"d2bf165284ab1953a96dfa7b642637a8"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyq",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743633",
"to_ids":true,
"type":"md5",
"uuid":"56d424d1-a3dc-4bb8-9e4b-18f1950d210f",
"value":"80440e78a68583b180ad4d3e9a676a6e"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyg",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743633",
"to_ids":true,
"type":"md5",
"uuid":"56d424d1-9ec0-4d57-9620-18f1950d210f",
"value":"d08e51f8187df278296a8c4ff5cff0de"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyg",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743634",
"to_ids":true,
"type":"md5",
"uuid":"56d424d2-58a0-4a99-8047-18f1950d210f",
"value":"efa5ea2c511b08d0f8259a10a49b27ad"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyg",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743634",
"to_ids":true,
"type":"md5",
"uuid":"56d424d2-8998-48fb-a9a9-18f1950d210f",
"value":"13d9352a27b626e501f5889bfd614b34"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyg",
"deleted":false,
"disable_correlation":false,
"timestamp":"1456743635",
"to_ids":true,
"type":"md5",
"uuid":"56d424d3-fab4-40b2-92f9-18f1950d210f",
"value":"e5b7fd7eed59340027625ac39bae7c81"
},
{
"category":"Payload delivery",
"comment":"Trojan-Banker.Win32.Capper.zyg - Xchecked via VT: e5b7fd7eed59340027625ac39bae7c81",