13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015RanosThis is a .NET Trojan developed to download and execute various malware families. Thereappears to be some naming confusion between Kazy and Ranos, however; whereas Kazyis classified as adware, Ranos is malware and is classified as a Trojan downloader. Due toits association as the downloader of other malware families, some variants of Ranos aremisidentified as Bladabindi and Strictor. Ranos displays the following behavioral and functionalcharacteristics:• The majority of Ranos is written in .NET.• Most variants of Ranos carry a compressed portion of their code in the resource area and arepartially compressed and encrypted using the DNGuard .NET obfuscator and code protector.The protected code is stored in the resource section and is handled by the ZYDNGuard method.• The developer metadata tends to contain information that aims to entice or socially engineera user into opening a file (the Trojan has been distributed with filenames such as pictures.exe,Flash Player.exe, and so forth).• Most of Ranos’ functionality is for downloading and dropping arbitrary files from remotelocations.• Ranos has been observed to modify Windows hosts files in order to thwart antivirus andWindows update activities.• Ranos tends to be distributed in files sized between 200 kb to 400 kb.BladabindiBladabindi is a very broadly <strong>report</strong>ed malware family, often misidentified in practice. It is oftenconfused with Zusy, Kazy, Disfa, and other MSIL malware families. Such name confusion andmisidentification make it difficult to accurately judge prevalence and identify succinct behavioralcharacteristics with automated analysis. However, Bladabindi displays the following behavioraland functional characteristics:• Bladabindi .NET malware variants often have backdoor functionality that allows unauthorizedaccess and control of a victim’s computer.• Some variants use a pluggable architecture that may allow the Trojan to be updated with newfunctionality after it is installed on a victim’s computer.• The malware adds a run key to the registry to execute when the system starts.• Bladabindi allows access to private information such as volume information, computer name,OS version, user name, and so forth.• The malware’s backdoor functionality allows an attacker to manipulate files and folders aswell as registry and firewall settings on the victim’s computer.• Some variants of Bladabindi are also known to dynamically inject MSIL code for obfuscationpurposes, which further hinders analysis.BarysBarys is a .NET malware family, some variants of which are often misidentified as Bladabindi.Barys displays the following behavioral and functional characteristics:• The Trojan drops itself into the Start Menu’s Startup folder, thus ensuring that it starts at everysystem start (unless user manually deletes it).• It modifies firewall rules.• The Trojan uses strings obfuscation, as well as injecting itself in memory, thus furthercomplicating its analysis.• The Trojan has a proxy functionality and may be used to relay Internet traffic.30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!