{"id":15491,"date":"2014-01-06T09:42:17","date_gmt":"2014-01-06T16:42:17","guid":{"rendered":"https://www.webroot.com/blog/?p=15491"},"modified":"2018-01-30T11:08:04","modified_gmt":"2018-01-30T18:08:04","slug":"zeus-infection-spoofing-bit-defender-av","status":"publish","type":"post","link":"https://www.webroot.com/blog/2014\/01\/06\/zeus-infection-spoofing-bit-defender-av\/","title":{"rendered":"Zeus Infection Spoofing Bitdefender AV"},"content":{"rendered":"<p>Over the Christmas period, we here at Webroot\u00a0 have noticed a large amount of Zeus infections that are spoofing the Bitdefender name.<\/p>\n<p>While infections spoofing AV companies aren\u2019t unusual, it\u2019s been a while since we have seen such a spike on one particular vendor in such a short time period. Most of the names are slight variations, but the numbers are impressive &#8211; <span style=\"text-decoration: underline;\">Overall, we have seen 40,000 unique MD5`s in the last week alone!<\/span><\/p>\n<p>The infection being dropped is from the Zeus family of infections, which are banking Trojans designed to steal login information when the user logs into their online banking website.<\/p>\n<p><strong>Infection Information:<\/strong><\/p>\n<ul>\n<li>File size is normally around 200-300kb<\/li>\n<li>It&#8217;s located in one path of the users appdata folder with a random path+file name<\/li>\n<li><i>C:\\users\\testPC\\Appdata\\&lt;random letters&gt;\\&lt;random letters.exe<\/i><\/li>\n<li>Usually dropped via an exploit kit (Blackhole being the most popular)<\/li>\n<li>However, it has also been seen attached to Spam emails<\/li>\n<li>Can disable Windows Firewall and Security Center<\/li>\n<li>Has the ability to connect to a remote server to download updates<\/li>\n<li>Can download other infections<\/li>\n<\/ul>\n<p><strong>Behaviour:<\/strong><\/p>\n<p><strong><\/strong>This infection can get onto a user\u2019s PC via a number of different methods, but the most common is through an exploit kit. The commonly used Blackhole exploit kits uses Java Exploits to drop and execute a file.<\/p>\n<p>Unless the user is very alert, they typically won\u2019t even notice they are infected. Once executed, the infection will try a number of methods to make sure it is automatically ran on start-up.<\/p>\n<p>The first is a registry key which points to the infection directly [1]<br \/>\nThe second is a fake Security Center update scheduled task [2]<br \/>\nThe third\u00a0 is to create a service that auto starts again point to the infection [3]<\/p>\n<ol>\n<li>hklm\\software\\microsoft\\windows\\currentversion\\run\u00a0\u00a0 &#8220;C:\\Users\\User\\Application Data\\Obunat\\ongekie.exe&#8221;<\/li>\n<li>%windir%\\tasks\\\u00a0SECURITY CENTER UPDATE &#8211; 4048458695.JOB<\/li>\n<li>hklm\\system\\currentcontrolset\\services\\securitycenterserver673348880\u00a0\u00a0 U5&#8243;C:\\WINDOWS\\system32\\igizhaot.exe&#8221; -service &#8220;C:\\Users\\User\\Application Data\\Obunat\\ongekie.exe&#8221;<\/li>\n<\/ol>\n<p>After this, the infection may connect to a remote server and receive updates and it can also download other infections (Cryptolocker\/ICE and other Rogue AV`s)<\/p>\n<p>Due to the large number of variants, I won\u2019t go through all the behaviours, but generally the infection route follows one of the patterns above. This infection can disable the Windows security center or modify the Firewall settings to allow remote access to the PC.<\/p>\n<p><span style=\"font-size: 2em; line-height: 1.5em;\">Examples:<\/span><\/p>\n<table width=\"639\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\"><b>MD5<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\"><b>PATH<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\"><b>FILE NAME<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\"><b>FILE SIZE<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\"><\/td>\n<\/tr>\n<tr>\n<td nowrap=\"nowrap\" width=\"259\">83890496EB018EA524E72CE18CD37209<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\ukhecy<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">REHEI.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">221,334KB<\/td>\n<\/tr>\n<tr>\n<td nowrap=\"nowrap\" width=\"259\">70AACDCEC7C9D35393CD9D382C8A0454<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\pawary<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">YVPULUV.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">217,222KB<\/td>\n<\/tr>\n<tr>\n<td nowrap=\"nowrap\" width=\"259\">ED098AB9A5E13D1B12BE816659C4172C<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\qaxuile\\<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">PAIDP.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">217,222KB<\/td>\n<\/tr>\n<tr>\n<td nowrap=\"nowrap\" width=\"259\">79776C5BE35DFC4089312D42EC70F903<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\hoydatem\\<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">SAAFIFV.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">217,222KB<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">25D00FC9F06E1720A7B4E4C9293D32AE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\siuvmyw\\<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">PYRUOV.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">218,783KB<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">79776C5BE35DFC4089312D42EC70F903<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"165\">%appdata%\\zoobir\\<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"133\">EQDUG.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">215,105KB<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"663\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\"><b>MD5<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\"><b>PATH<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\"><b>FILE NAME<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\"><b>FILE SIZE<\/b><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\"><b>PC Count<\/b><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\"><\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\"><\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">A748FEB8EE581E2225CE7F983E364EC0<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\">%temp%<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\">JAVA_UPDATE_71972350.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">\n<p align=\"right\">222,827<\/p>\n<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\">\n<p align=\"right\">181<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">EC9FC4EE2AA75D0CD6E0490853F27B21<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\">%temp%<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\">JAVA_UPDATE_7bb116be.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">\n<p align=\"right\">215,105<\/p>\n<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\">\n<p align=\"right\">105<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">DB97134AFFDA00379CAF3FCD00BBFFFF<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\">%temp%<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\">JAVA_UPDATE_93D4FD64.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">\n<p align=\"right\">216,678<\/p>\n<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\">\n<p align=\"right\">231<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">4FCD4FD7D3D3A5D24EF663CE3419D7CC<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\">%temp%<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\">JAVA_UPDATE_0EEF9307.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">\n<p align=\"right\">217,222<\/p>\n<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\">\n<p align=\"right\">174<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"259\">D4BC7886F04574E5628FD6BBFBB01C19<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"75\">%temp%<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"184\">JAVA_UPDATE_8C3C4799.EXE<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"81\">\n<p align=\"right\">218,873<\/p>\n<\/td>\n<td valign=\"bottom\" nowrap=\"nowrap\" width=\"64\">\n<p align=\"right\">134<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In total, we have seen over 40k files and this is increasing every hour. Most of the files have a digital vendor that is close to the real version (shown below). As you can see from the screenshot above, a number of the files are pretending to be Java updates.<\/p>\n<p><i>BitKefender S.R.L.<\/i> with 869 unique MD5`s<br \/>\n<i>BitNefender S.R.L.|BitNefender Antivirus Scanner<\/i> with unique 19,305 MD5`s<\/p>\n<p><strong>Removal:<\/strong><\/p>\n<p>Due to the infection route of this particular infection, it is advisable to have the latest version of Java installed and preferably use a modern secure browser with the latest Windows updates installed. The latest build of Firefox disables Java plugins by default, which should help stop this particular attack vector.<\/p>\n<p>As mentioned earlier, this infection has also been seen to be spread by email. It is advisable to use an email provider that has good SPAM filtration. Google and Microsoft mail services are efficient at blocking these emails.<\/p>\n<p>Always be alert to any email attachments, even if they&#8217;re from friends\/relatives, and especially executable files that are inside a zip file. Over the Christmas period, we have also noticed a targeted attack from malware authors using well known store names lie Costco, Walmart, etc. in spoof emails.<\/p>\n<p>Since SecureAnywhere doesn&#8217;t rely on traditional definitions, we can react instantly to this new trend of Zeus. Webroot SecureAnywhere can safely block this infection. Likewise, if installed on a pre-infected PC, <a href=\"http:\/\/bit.ly\/1dqc6pM\" target=\"_blank\">Webroot SecureAnywhere<\/a> can remove the infection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the Christmas period, we here at Webroot\u00a0 have noticed a large amount of Zeus infections that are spoofing the Bitdefender name. While infections spoofing AV companies aren\u2019t unusual, it\u2019s been a while since we have seen such a spike on one particular vendor in such a short time period. Most of the names are [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[16855,16853,16847,16843,16839,8915,4911,3619,16859,16845,6121,16857,4333,16851,4689,16841,4283,16849,3471,3465],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15491"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=15491"}],"version-history":[{"count":7,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15491\/revisions"}],"predecessor-version":[{"id":15499,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/15491\/revisions\/15499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=15491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=15491"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=15491"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=15491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}