Bookworm: installation with Microsoft & Kaspersky files

Bookworm: Ένα νέο trojan που ανακαλύφθηκε από την Palo Alto Networks χρησιμοποιεί λογισμικό ασφαλείας που υπάρχει εγκατεστημένο στον of the user to load DLL required to install it.trojan

This new trojan was called Bookworm by them researchers from Palo Alto, and has some similarities to RAT PlugX.

For now, Palo Alto reports that the trojan is only released in Thailand.

Regarding its internal structure, Bookworm appears to be part of a new upward trend in vertebrate malware,

The malicious threats it contains begin to install on the victim's computer in multiple stages to avoid detection. They allegedly use a remote C&C server (administration and control) to control what components they upload to the victim's computer, based on the target profile.

The internal architecture of the trojan Bookworm is simple. Many malicious DLLs are encrypted using the XOR algorithm and stack together in a Readme.txt file.

This Readme.txt then works with purely executable DLLs and some other than a self-extracting RAR file, which in turn incorporates the Smart Installer, an application for creating installation packages.

When the installer runs, the self-extracting hardware that discharges the malware from the Readme.txt, clean DLL, and the clean EXE.

But the interesting thing is that after the completion of the preτος εγκατάστασης, λανσάρει αυτόματα το καθαρό EXE που μόλις έχει δημιουργηθεί. Αυτό το εκτελέσιμο αρχείο αρχίζει να αναζητεί εκτελέσιμα αρχεία των εφαρμογών Malware Protection (MsMpEng.exe) and Kaspersky Anti-Virus (ushata.exe)..

When it discovers them, it loads the clean DLL files into those executables and uses the permissions of those applications to install as of Microsoft.

So Bookworm. has all the permissions it needs to run all the modules in the readme.txt file, and starts communications with the C&C server, adding new malicious files while sending stolen data to the server.

The researchers did not say what other modules were found, as Bookworm is difficult to analyze, as it uses at least four encryption algorithms when communicating with the C&C server (RC4, AES, XOR, and LZO).

Bookworm

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).