News Security

Seqrite detects high-risk Trojan

Blocked by the brand’s innovative security solutions, the malware exhibits advanced attack methodology

In a breakthrough which highlights how rapidly the threat landscape is evolving, Seqrite has broken the existence of a highly-sophisticated Trojan dropper targeting businesses which delivers both ransomware and cryptomining payloads. It was detected when the Seqrite experts observed a series of evolved malware blocked by the brand’s state-of-the-art security solutions at the customers’ end.

The ransom-miner delivers GandCrab ransomware and Monero Cryptominer malware onto compromised systems, amongst other infected files and scripts. It also tries to perform various malicious activities by connecting to one or more Command and Control (CnC) servers. Researchers at Seqrite consider the latest threat to be part of a sustained campaign targeting end-users with multipurpose attacks comprising multiple malware.

Speaking on the discovery, Sanjay Katkar, Joint Managing Director and Chief Technology Officer, Quick Heal Technologies, said, “We have raised multiple alerts about the growing number of cryptojacking attacks, and have been talking about a possible evolution of the threat which can deliver both cryptomining and ransomware payloads. The discovery of this new Trojan dropper further underlines the need for greater security awareness and more robust security solutions. With our state-of-the-art malware detection and security mechanisms, we have blocked these threats from compromising the security profile of our enterprise customers. We will continue to study the malware and its various strains in order to devise more robust security strategies to continue protecting Seqrite customers against this new threat,” Sanjay added.

What’s interesting about the latest threat identified by Seqrite is the level of sophistication that it exhibits. Launched through a PE32 executable file for Microsoft Windows, the ransom-miner is encrypted and contains high-entropy data. Once the infected file is downloaded, the malware decrypts some of the code and one compressed PE file. The control passes on to the decrypted code post decryption, which decompresses the PE file in memory and overwrites the parent process memory. This decompressed file is the main malware file and performs further activity once executed.

Moreover, the malware compares 16 process names to identify the presence of VMware, VirtualBox, and related components. It also checks for the Sandbox by verifying the presence of “sbiedll.dll”. If it identifies the existence of a virtual environment, the malware stops its activity by calling for the ‘ExitProcess’ function and stops its current running processes.

Related posts

Ooredoo to drive 5G Enterprise Innovation with Nokia

enterpriseitworld

WSO2 brings API Management and Integration Offerings

enterpriseitworld

NetApp released its 2024 Cloud Complexity Report

enterpriseitworld
x