Original release date: August 26, 2020Notification
This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.
This document is marked TLP:WHITE–Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.
Summary
Description
This Malware Analysis Report (MAR) is the result of analytic efforts between the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD). Working with U.S. Government partners, DHS, FBI, and DoD identified Remote Access Tool (RAT) malware variants used by the North Korean government. This malware variant has been identified as FASTCASH for Windows. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https[:]//www[.]us-cert.gov/hiddencobra.
FBI has high confidence that HIDDEN COBRA actors are using malware variants in conjunction with proxy servers to maintain a presence on victim networks and to further network exploitation. DHS, FBI, and DoD are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.
This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques. Users or administrators should flag activity associated with the malware and report the activity to the Cybersecurity and Infrastructure Security Agency (CISA) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.
This submission included two unique files. The first file is a malicious application, which can be utilized to inject a dynamic link library (DLL) into a remote Windows process. The second file is a malicious Windows DLL. The DLL contains two functions that can hook callbacks to the Windows application programming interfaces (APIs) “Send” and “Recv” within a targeted process. These hook functions are utilized to intercept traffic received by the target process. In received Financial Messages, the malicious functions will look for targeted Primary Account Numbers (PAN) to deliver a custom response. It appears the malware will target a system on a bank infrastructure, which is designed to process automated teller machine (ATM) transactions.
This updated report included an additional sample that is used by advanced persistent threat (APT) cyber actors in the targeting of banking payment systems. The sample is a man-in-the-middle bank transaction modification malware. Once the malware is injected into an executable, it takes control of the send and receive functions in order to identify, log, and modify ISO 8583 messages. ISO 8583 is an international standard for financial transaction card originated interchanged messaging. This functionality enables the actor to withdraw more money than is actually available. The malware specifically targets ISO 8583 Point of Sale (POS) system messages, ATM transaction requests, and ATM balance inquiries. The sample uses code from open source repositories on the Internet and modifies the parsing code to support Extended Binary Coded Decimal Interchange Code (EBCDIC) encoding. EBCDIC is a character encoding format like the more commonly ASCII.
For a downloadable copy of IOCs, see [STIX file].
Submitted Files (3)
129b8825eaf61dcc2321aad7b84632233fa4bbc7e24bdf123b507157353930f0 (switch.dll)
39cbad3b2aac6298537a85f0463453d54ab2660c913f4f35ba98fffeb0b15655 (switch.exe)
5cb7a352535b447609849e20aec18c84d8b58e377d9c6365eafb45cdb7ef949b (A2B1A45A242CEE03FAB0BEDB2E4605…)
Findings
129b8825eaf61dcc2321aad7b84632233fa4bbc7e24bdf123b507157353930f0
Tags
HIDDEN-COBRAtrojan
Details
Name
switch.dll
Size
118784 bytes
Type
PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5
c4141ee8e9594511f528862519480d36
SHA1
2b22d9c673d031dfd07986906184e1d31908cea1
SHA256
129b8825eaf61dcc2321aad7b84632233fa4bbc7e24bdf123b507157353930f0
SHA512
dfc1ad2cb2df2b79ac0f2254b605a2012b94529ac220350a4075e60b06717918175cff5c22e52765237b78ec4edffd6df20f333e28a405a4339a10288158e7fc
ssdeep
3072:lUGDXTpE8AKDKDOf+8ZagCfG4aAzFdIARrhxg6/ZpDA:+GDXTpFDKDMZagX4aAB2Cg6hpD
Entropy
6.454745
Antivirus
Antiy
Trojan/Win32.Tiggre
Avira
TR/Spy.Banker.pubvd
BitDefender
Trojan.GenericKD.32541173
ClamAV
Win.Trojan.Alreay-7189205-0
Comodo
Malware
ESET
a variant of Win32/NukeSped.GA trojan
Emsisoft
Trojan.GenericKD.32541173 (B)
Ikarus
Trojan.Spy.Banker
K7
Riskware ( 0040eff71 )
Lavasoft
Trojan.GenericKD.32541173
McAfee
Trojan-Banking
NANOAV
Trojan.Win32.NukeSped.gexoae
Sophos
Troj/Banker-GYS
Symantec
Trojan Horse
TrendMicro
Backdoo.62DC2502
TrendMicro House Call
Backdoo.62DC2502
VirusBlokAda
BScope.TrojanBanker.Agent
Zillya!
Trojan.NukeSped.Win32.183
YARA Rules
rule CISA_10257062_01 : ATM_Malware
{
meta:
Author = “CISA Code & Media Analysis”
Incident = “10257062”
Date = “2019-09-26”
Last_Modified = “20200117_1732”
Actor = “n/a”
Category = “Financial”
Family = “ATM_Malware”
Description = “n/a”
MD5_1 = “c4141ee8e9594511f528862519480d36”
SHA256_1 = “129b8825eaf61dcc2321aad7b84632233fa4bbc7e24bdf123b507157353930f0”
strings:
$x3 = “RECV SOCK= 0x%p, BUF= 0x%p, LEN= 0x%08X, RET= %08X, IP= %s, Port= %d” fullword ascii
$x4 = “init_hashmap succ” fullword ascii
$x5 = “89*(w8y92r3y9*yI2H28Y9(*y3@*” fullword ascii
condition:
($x3) and ($x4) and ($x5)
}
ssdeep Matches
No matches found.
PE Metadata
Compile Date
2019-06-22 01:59:31-04:00
Import Hash
0ab159bd939411cb8df935bd9e7b5835
PE Sections
MD5
Name
Raw Size
Entropy
00f8301c11847b70346d6271098d8f1c
header
1024
2.296500
c3bee35076d728ce32b67f5bc66587f3
.text
84992
6.641787
6b094443cad879acc7285f991243ddb0
.rdata
17920
5.170073
11060bd3e49075b78be8670ff46d9a48
.data
7168
4.275765
3637e0cd32608b060e308fdd9742ea97
.reloc
7680
4.792696
Packers/Compilers/Cryptors
Microsoft Visual C++ DLL *sign by CodeRipper
Description
This file is a malicious Windows 32-bit DLL. Upon execution, it attempts to read the file “c:\tempinfo.dat”. Analysis of this implant indicates the encrypted file “info.dat” will contain targeted PAN numbers, which are expected to be contained within transactions possibly originating from ATM systems. Analysis indicates the malware decrypts “info.dat” utilizing what appears to be the AES encryption algorithm. The key utilized for this decryption is displayed below:
–Begin Decryption Key–
89*(w8y92r3y9*yIy(8Y23RHWIEFH238
–End Decryption Key–
The decrypted contents of “info.dat” are then parsed. Sub-components of the file are then further decoded using a hard-coded rotating XOR cipher (Figure 1). The data used as the rotating XOR cipher key is displayed below:
–Begin Rotating XOR Cipher Key–
963007772C610EEEBA51099919C46D078FF46A7035A563E9A395649E3288DB0EA4B8DC791EE9D5E088D9D2972B4CB609BD7CB17E072DB8E7911DBF906410B71DF220B06A4871B9F3DE41BE847DD4DA1AEBE4DD6D51B5D4F4C785D38356986C13C0A86B647AF962FDECC9658A4F5C0114D96C0663633D0FFAF50D088DC8206E3B5E10694CE44160D5727167A2D1E4033C47D4044BFD850DD26BB50AA5FAA8B5356C98B242D6C9BBDB40F9BCACE36CD832755CDF45CF0DD6DC593DD1ABAC30D9263A00DE518051D7C81661D0BFB5F4B42123C4B3569995BACF0FA5BDB89EB802280888055FB2D90CC624E90BB1877C6F2F114C6858AB1D61C13D2D66B69041DC760671DB01BC20D2982A10D5EF8985B1711FB5B606A5E4BF9F33D4B8E8A2C9077834F9000F8EA8099618980EE1BB0D6A7F2D3D6D08976C6491015C63E6F4516B6B62616C1CD83065854E0062F2ED95066C7BA5011BC1F4088257C40FF5C6D9B06550E9B712EAB8BE8B7C88B9FCDF1DDD62492DDA15F37CD38C654CD4FB5861B24DCE51B53A7400BCA3E230BBD441A5DF4AD795D83D6DC4D1A4FBF4D6D36AE96943FCD96E34468867ADD0B860DA732D0444E51D03335F4C0AAAC97C0DDD3C710550AA41022710100BBE86200CC925B56857B3856F2009D466B99FE461CE0EF9DE5E98C9D9292298D0B0B4A8D7C7173DB359810DB42E3B5CBDB7AD6CBAC02083B8EDB6B3BF9A0CE2B6039AD2B1743947D5EAAF77D29D1526DB048316DC73120B63E3843B64943E6A6D0DA85A6A7A0BCF0EE49DFF099327AE000AB19E077D44930FF0D2A3088768F2011EFEC206695D5762F7CB67658071366C19E7066B6E761BD4FEE02BD3895A7ADA10CC4ADD676FDFB9F9F9EFBE8E43BEB717D58EB060E8A3D6D67E93D1A1C4C2D83852F2DF4FF167BBD16757BCA6DD06B53F4B36B248DA2B0DD84C1B0AAFF64A0336607A0441C3EF60DF55DF67A8EF8E6E3179BE69468CB361CB1A8366BCA0D26F2536E2685295770CCC03470BBBB91602222F260555BE3BBAC5280BBDB2925AB42B046AB35CA7FFD7C231CFD0B58B9ED92C1DAEDE5BB0C2649B26F263EC9CA36A750A936D02A906099C3F360EEB8567077213570005824ABF95147AB8E2AE2BB17B381BB60C9B8ED2920DBED5E5B7EFDC7C21DFDB0BD4D2D38642E2D4F1F8B3DD686E83DA1FCD16BE815B26B9F6E177B06F7747B718E65A0888706A0FFFCA3B06665C0B0111FF9E658F69AE62F8D3FF6B6145CF6C1678E20AA0EED20DD75483044EC2B30339612667A7F71660D04D476949DB776E3E4A6AD1AEDC5AD6D9660BDF40F03BD83753AEBCA9C59EBBDE7FCFB247E9FFB5301CF2BDBD8AC2BACA3093B353A6A3B4240536D0BA9306D7CD2957DE54BF67D9232E7A66B3B84A61C4021B685D942B6F2A37BE0BB4A18E0CC31BDF055A8DEF022D759800007398
–End Rotating XOR Cipher Key–
This application will not run without the file “info.dat”, which was not available at the time of analysis.
Upon execution, the malware creates the directory “C:tmp_DMP”. The malware will use this location as a working directory on the targeted system. The malware will store run time logs within this folder. When executed, the malware will create a log file with the following file name format “c:\tmp\_DMP\TMPL_%d_%d.tmp” in this folder and stamps it with the data “HK-Start”.
This binary contains two functions, which provides context to the malware’s purpose and capability. Analysis indicates this DLL is injected into a targeted process. In order to capture and analyze incoming network traffic, the malware hooks the “Send” and “Recv” Windows API within a targeted process. One of these functions, located at offset “0x00004f60”, appears to search for incoming network traffic for “x200” Financial Request Messages, such as the type that may be generated from an ATM banking system. When the malware captures data it uses the “getpeername” API to get the IP address of the connected host. It then converts this IP address to integer value using the “ntohs API”. If the integer value of the IP address matches either “16843029” or “33620245” the malware will search it for a “Financial Request Message” (Figure 6). If not, it will process the incoming data as normal, however it still attempts to log it to a file named “c:\tmp\_DMP\TMPL_%d_%d.tmp” in the format RECV SOCK= 0x%p, BUF= 0x%p, LEN= 0x%08X, RET= %08X, IP= %s, Port=.
Upon receipt of one of these Financial Request Messages, this structure will create a log file that is named with the following format: “c:\tmp\_DMP\TMPL_%d_%d.tmp”. The format of the data logged in this log file will be as follows:
–Begin Logged Message Data–
Message(msg=%d, ct=%d, pc=%d, sd=%d, pan=%s, date=%s)
–End Logged Message Data–
Upon receipt of a Financial Request Message the malware will decode a portion of the data, which was AES decrypted from the file “info.dat” to see if portions of it match the incoming Financial Request Message (Figure 3). Although the file “info.dat” was not available for analysis, it appears the malware is ensuring the PAN numbers of the incoming message match one of the PAN numbers contained within “info.dat”.
Static analysis indicates the malware utilizes an encrypted file named “blk.dat”. This file is expected to contain a blacklist of ATM transactions, which will be denied by the hook function (Figure 2). This file was not available for analysis.
When the malware receives a request from an ATM, if it contains a PAN number configured in info.dat (Figure 3) and it is not on the blacklist in “blk.dat”, the malware will craft a response and send it to the ATM system (Figure 4). It appears the response to the ATM will allow the transaction to proceed and potentially allow the hackers to illegally withdraw money. If the transaction is hijacked and approved, the malware records this success in the encrypted log file “suc.dat”.
If the transaction is rejected, because it is on the blacklist in “blk.dat”, this error is logged to the file “err.dat”. If the transaction does not contain a configured PAN or a transaction on the blacklist, the malware will pass it on as normal to the targeted application. When the malware receives an identified Financial Request Message, it will log it to a file with the name format “c:\tmp\_DMP\TMPL_%d_%d.tmp”. The message itself will be logged into this file with the format “Message(msg=%d, ct=%d, pc=%d, sd=%d, pan=%s, date=%s)”.
The actual response back to the ATM system will be logged into a file with the filename format “c:\tmp\_DMP\TMPL_%d_%d.tmp”. The format of the data written to this file will be send socket=0x%X, ret=%d, err=%d.
Analysis indicates the Send API is hooked with a function that uses the “getpeername” IP address of the connected host. The IP address of the host is converted using “ntohs” and if it matches one of the values “16843029” or “33620245” the sent traffic will be logged in a file named “c:\tmp\_DMP\TMPL_%d_%d.tmp”. The format of the sent data logged is SEND SOCK= 0x%p, BUF= 0x%p, LEN= 0x%08X, RET= %08X, IP= %s, Port= (Figure 7). Static analysis indicates successful hooks made to the “Send” and “Recv” APIs within the target process will be logged in a file named “c:\tmp\_DMP\TMPL_%d_%d.tmp” with the format “g_hook_flag = %d”.
Screenshots
Figure 1 – Cipher used when decoding data in “info.dat”.
Figure 2 – API “Recv” hook checking for incoming Financial Request Message for a targeted PAN.
Figure 3 – The malware searching for targeted PANs.
Figure 4 – Malware crafting and sending responses to the ATM.
Figure 5 – Hook function either searching network traffic for Financial Message or logging it and sending to the “RECV” API.
Figure 6 – “RECV” Hook API function checking if the connected host is one of the two IP addresses.
Figure 7 – Logging outbound traffic to the two specific IP addresses.
39cbad3b2aac6298537a85f0463453d54ab2660c913f4f35ba98fffeb0b15655
Tags
HIDDEN-COBRAtrojan
Details
Name
switch.exe
Size
67448 bytes
Type
PE32 executable (GUI) Intel 80386, for MS Windows
MD5
89081f2e14e9266de8c042629b764926
SHA1
730c1b9e950932736fc4b02cbdb4e4e891485ac2
SHA256
39cbad3b2aac6298537a85f0463453d54ab2660c913f4f35ba98fffeb0b15655
SHA512
bbb5aa4d8e7a011daff71774ee9c74fa4d14627de1c25e0437c879bd1cd137223d5c2fb20fd101a511a95e59d91ea884b0947229ee67e40a4a24350573fb9e54
ssdeep
768:aQ1PWoWzXyjJsTKJUniYs1pdLn4nDT622YuYDIhscWTJqLPNofEDy9nAXmIEHbKa:aQ5WDziX+nD0LWT6FYZDgs5ULPIJEYp
Entropy
6.396614
Antivirus
Ahnlab
HackTool/Win32.Injector
Antiy
Trojan[Banker]/Win32.Alreay
ClamAV
Win.Trojan.Alreay-7189192-0
Comodo
Malware
ESET
a variant of Generik.CWSORYC trojan
Emsisoft
Gen:Variant.Ursu.634943 (B)
Ikarus
Trojan.Inject
K7
Riskware ( 0040eff71 )
McAfee
Trojan-Banking
Microsoft Security Essentials
Trojan:Win32/LazInjector.DD!MSR
NANOAV
Trojan.Win32.Alreay.geqrko
Sophos
Troj/Banker-GYS
Symantec
Trojan Horse
TrendMicro
TROJ_NO.4FADD924
TrendMicro House Call
TROJ_NO.4FADD924
VirusBlokAda
TrojanBanker.Alreay
Zillya!
Trojan.Alreay.Win32.96
YARA Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date
2018-06-13 02:17:06-04:00
Import Hash
c9febdea3218b92a46f739082f26471e
PE Sections
MD5
Name
Raw Size
Entropy
cde81f1500263860f325ee8f80c483ce
header
1024
2.497464
a8c0a36524287fef367821e833a68350
.text
38912
6.518662
e1c66ff8e5f0e1909e2691360c974420
.rdata
10752
4.878020
22783e6c2539d6828f3d42b030ca08e9
.data
4096
2.117927
81195ca9b22c050f79e44175e9e7150e
.rsrc
512
5.105006
36571bcb45b1ae18dfcf7edc8c5c3d4a
.reloc
3584
4.791228
Packers/Compilers/Cryptors
Microsoft Visual C++ ?.?
Description
This file is a malicious 32-bit Windows executable. It is a command-line utility. Static analysis indicates its primary purpose is to allow a user to inject a DLL into a remote process.
5cb7a352535b447609849e20aec18c84d8b58e377d9c6365eafb45cdb7ef949b
Tags
HIDDEN-COBRAtrojan
Details
Name
A2B1A45A242CEE03FAB0BEDB2E460587
Size
130560 bytes
Type
PE32 executable (DLL) (console) Intel 80386, for MS Windows
MD5
a2b1a45a242cee03fab0bedb2e460587
SHA1
e9c9ef312370d995d303e8fc60de4e4765436f58
SHA256
5cb7a352535b447609849e20aec18c84d8b58e377d9c6365eafb45cdb7ef949b
SHA512
4ced785089832287d634c77c2b5fb16efb2147b75da9014320c98d1bc0933504bfba77273576c35b97548d25acb88a0f2944cbef6a78509f945a8502f8910da8
ssdeep
3072:j5KO2SQhF+VJbGHMjjNNyCkeZjDYJklGCx:oO2SQT+nGHADyAZjJwC
Entropy
6.431962
Antivirus
VirusBlokAda
BScope.TrojanBanker.Agent
YARA Rules
rule CISA_3P_10257062 : HiddenCobra FASTCASH trojan
{
meta:
Author = “CISA Trusted Third Party”
Incident = “10257062”
Date = “2020-08-11”
Actor = “Hidden Cobra”
Category = “Trojan”
Family = “FASTCASH”
Description = “Detects HiddenCobra FASTCASH samples”
MD5_1 = “a2b1a45a242cee03fab0bedb2e460587”
SHA256_1 = “5cb7a352535b447609849e20aec18c84d8b58e377d9c6365eafb45cdb7ef949b”
strings:
$sn_config_key1 = “Slsklqc^mNgq`lyznqr[q^123”
$sn_config_key2 = “zRuaDglxjec^tDttSlsklqc^m”
$sn_logfile1 = “C:\intel\_DMP_V\spvmdl.dat”
$sn_logfile2 = “C:\intel\_DMP_V\spvmlog_%X.dat”
$sn_logfile3 = “C:\intel\_DMP_V\TMPL_%X.dat”
$sn_logfile4 = “C:\intel\mvblk.dat”
$sn_logfile5 = “C:\intel\_DMP_V\spvmsuc.dat”
condition:
all of ($sn*)
}
ssdeep Matches
No matches found.
PE Metadata
Compile Date
2018-07-03 08:11:16-04:00
Import Hash
76e8a4f811b021cf503340a0077515cc
PE Sections
MD5
Name
Raw Size
Entropy
cbe7e7fdab96c22785fa8d7c03ca6b2b
header
1024
2.429436
03d36f4d9ae3e002027c981c399ab8c6
.text
89600
6.630313
d1f983704c508544b315d577fe3563e1
.rdata
23040
5.215776
a4b79dca294053725e2b2091453d9d85
.data
8192
4.358771
d762ef71411860ae50212e14c0a5ba72
.rsrc
512
5.115767
2e4eb6056385f6f721d970cafe65bebe
.reloc
8192
4.774185
Packers/Compilers/Cryptors
Microsoft Visual C++ DLL *sign by CodeRipper
Description
The file uses a configuration file, a black-list, and a series of log files:
–Begin files–
C:intelmyconf.ini: Configuration file that contains account numbers (encrypted) C:intelmyblk.dat: Black-listed account numbers (encrypted) C:intel_DMP_Vspvmlog_<PID>.dat: Logs general messages and errors.
Entry Format: [<YYYY-MM-DD HH:MM:SS.sss>][PID:<PID>][TID:<TID>] <Message>”]
C:intel_DMP_Vspvmdl.dat: Logs API hooking/unhooking success and failure.
Entry Format:
Hook Success Entry: ‘Windows’
Hook Error Entry: ‘Linux’
UnHook Success Entry: ‘Acer’
UnHook Error Entry: ‘Lenovo’
C:intel_DMP_VTMPL<PID>.dat: Logs Send/Receive Message metadata
Entry Format:
Recv Entry: ‘recv – SOCK=<socket_id>, Addr=<IP>, Port=<Port>, pBuf=<data>, size=<datasize>’ Send Entry: ‘send – SOCK=<socket_id>, Addr=<IP>, Port=<Port>, size=<datasize>’ C:intel_DMP_VTMPR<PID>.tmp: Logs Received Messages
C:intel_DMP_VTMPS<PID>.tmp: Logs Sent Messages
C:intel_DMP_VTMPHSMS<PID>.tmp: Logs LocalHost ARQC sent messages C:intel_DMP_VTMPHSMR<PID>.tmp: Logs LocalHost ARQC received messages
C:intel_DMP_Vspvmscap.dat: Logs modified sent messages
C:intel_DMP_Vspvmsuc.dat: Logs modified sent messages metadata (encrypted)
–End files–
Upon attaching to a process, the sample will decrypt the encrypted config from the configuration file and read it into memory. Next, it will hook the processes send and recv winAPIs. When the “send” function is called, it will check to see if the port is 7029, if so, it will log the data and metadata in the above log files, if not it will just pass through calling send as the program normally would. When the “receive” function is called, it will check to see if the port is 7029, if so, it will wait for packets received from port 7029 and parse the following ISO8583 fields out of the incoming datagram:
–Begin fields–
MESSAGE_TYPE_INDICATOR (MTI)
PRIMARY_ACCOUNT_NUMBER (PAN)
PROCESSING_CODE
RESERVED_NATIONAL_3
–End fields–
Next, it checks the loaded configuration for the PAN. If it exists, it will continue processing, otherwise it will pass. Then it will check the blacklist file for the PAN. If blacklist contains ‘all’ or the PAN, will set the RESPONSE_CODE to 51 (Insufficient funds) in the response message. It looks for the following message types:
–Begin message types–
POS system message
ATM transaction request
ATM balance inquiry
–End message types–
Next it, constructs what appears to be an Authorization Request Cryptogram (ARQC) message:
–Begin format–
Uses the PRIMARY_ACCOUNT_NUMBER and ICC_DATA
Contains the hardcoded string: “U8BFE0AE12F9000C1480B297BE43CAC97”
Sends to localhost on port 9990
Parses the response Authorization Response Cryptogram (ARPC) message
–End format–
Finally, it constructs and sends a ISO8583 response message.
When detaching from the process, the sample unhooks the “send” and “recv” WINAPI functions, returning them to their normal state. It will then overwrite the first 0x400 bytes of the in-memory DLL from the process, effectively cleaning up any trace of the sample.
The sample frequently uses code that is taken from GitHub with a few modifications in some cases. The sample uses code that is taken from github.com/petewarden/c_hashmap to load the configuration file into memory in a hashmap, API hooking using Microsoft’s Detour library at github.com/Microsoft/Detours and the ISO8583 parsing code is taken from github.com/sabit/Oscar-ISO8583 (slightly modified to facilitate parsing of IBM037 formatted data).
The encryption that is used for all log/config files is likely an AES variant with the following keys:
–Begin keys–
zRuaDglxjec^tDtt
Slsklqc^mNgq`lyz
–End keys–
Recommendations
CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.
Maintain up-to-date antivirus signatures and engines.
Keep operating system patches up-to-date.
Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
Enforce a strong password policy and implement regular password changes.
Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
Disable unnecessary services on agency workstations and servers.
Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
Scan all software downloaded from the Internet prior to executing.
Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).
Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.
Contact Information
1-888-282-0870
CISA Service Desk (UNCLASS)
CISA SIPR (SIPRNET)
CISA IC (JWICS)
CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://www.cisa.gov/forms/feedback/
Document FAQ
What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.
Can I submit malware to CISA? Malware samples can be submitted via three methods:
Web: https://malware.us-cert.gov
E-Mail: [email protected]
FTP: ftp.malware.us-cert.gov (anonymous)
CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.
This product is provided subject to this Notification and this Privacy & Use policy.