{"id":2719,"date":"2024-09-25T19:36:54","date_gmt":"2024-09-25T19:36:54","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=2719"},"modified":"2025-07-29T06:35:51","modified_gmt":"2025-07-29T06:35:51","slug":"zeus-grandson-atmos-picks-up-the-family-trade","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/zeus-grandson-atmos-picks-up-the-family-trade\/","title":{"rendered":"ZeuS\u2019 grandson Atmos picks up the family trade"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"281\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7862855188_b93525e4a4_b.webp\" alt=\"ZeuS\u2019 grandson Atmos picks up the family trade\" class=\"wp-image-2736\" style=\"width:784px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p>Version:1.0 StartHTML:000000276 EndHTML:000020624 StartFragment:000007074 EndFragment:000020556 StartSelection:000007074 EndSelection:000020540 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=85&amp;url=ZeuS\u2019%20grandson%20Atmos%20picks%20up%20the%20family%20trade LMNTRIX Labs LMNTRIX Labs<\/p>\n\n\n\n<p>In the malware pantheon, one of the most highly revered strains is ZeuS \u2013 a banking trojan that was particularly virulent in the mid-to-late 2000s. The source code was being sold online for years until it was <a href=\"https:\/\/threatpost.com\/zeus-source-code-leaked-051011\/75217\/\" target=\"_blank\" rel=\"noopener\">leaked in 2011<\/a> which led to ZeuS becoming the progenitor of multiple malware strains including <a href=\"https:\/\/krebsonsecurity.com\/tag\/citadel-trojan\/\" target=\"_blank\" rel=\"noopener\">Citadel<\/a>, from which the current strain of Atmos malware is based. In a sense, ZeuS is Atmos\u2019 grandfather.&nbsp;<br><br>Atmos usually targets banks and is run off the back of a huge botnet which pulls the malware\u2019s strings from the command and control (C&amp;C) server. While at heart a banking trojan, Atmos also has personal information in its sights.<br><br>Like ZeuS, one of Atmos&#8217; (and Citadel\u2019s before it) main features is Web injection which is the ability to modify banking websites and serve up rogue Web forms which asks victims for sensitive information, like credit card details. Also like Zeus, Atmos includes key logger capabilities which allows attackers to record key strokes during username and password input phases.<br><br><strong>Atmos Infection and Sales Cycle<\/strong>&nbsp;<br><br>Atmos is initiated when a user feeds their login details to a compromised website. While the data is sent to the webserver, it is also sent to Atmos\u2019 C&amp;C server, giving the attacker the victim\u2019s login details:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"613\" height=\"373\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/1-4-2.webp\" alt=\"\" class=\"wp-image-2724\"\/><\/figure>\n\n\n\n<p><br><br><em>Figure 1 Botnet Internal<\/em><br><br>At its peak, Citadel\u2019s developer operated a 7,000 strong botnet primarily with Russian computers. He was <a href=\"https:\/\/www.justice.gov\/usao-ndga\/pr\/russian-developer-notorious-citadel-malware-sentenced-prison\" target=\"_blank\" rel=\"noopener\">arrested by the FBI<\/a> in 2015. That Citadel botnet variant contained personal information including online banking credentials, credit card information, and other personally identifying data.<br><br>The below image shows the Citadel bot builder which was used to create the customized botnet sample. Later versions included the ability to avoid AV detection.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"616\" height=\"472\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/2-3-2.webp\" alt=\"\" class=\"wp-image-2725\"\/><\/figure>\n\n\n\n<p><em>Figure 2 Citadel Bot Builder<\/em><br><br>Returning to the current Atmos strain, below is the bot builder interface:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"580\" height=\"415\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/3-3-2.webp\" alt=\"\" class=\"wp-image-2726\"\/><\/figure>\n\n\n\n<p><em>Figure 3 Atmos Builder<\/em><br><br>Below, the Atmos\u2019 authors include the malware\u2019s features in their sales pitch:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1007\" height=\"763\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/4-3-2.webp\" alt=\"\" class=\"wp-image-2727\"\/><\/figure>\n\n\n\n<p><em>Figure 4 Citadel (Atmos) Features<\/em><br><br>While the above list, surprisingly, doesn\u2019t include a purchase price, we saw Atmos for sale between USD$2,000 and USD$6,000 last year:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"897\" height=\"230\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/5-3-2.webp\" alt=\"\" class=\"wp-image-2728\"\/><\/figure>\n\n\n\n<p><em>Figure 5 Price of Atmos (March 2016)<\/em><br><br><strong>Country Stats<\/strong><br><br>Atmos\u2019 authors are indiscriminate in the countries they target. We have witnessed multiple infection methods, including spam campaigns and Web injection. The following image shows which countries make up Atmos\u2019 botnet:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"651\" height=\"519\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/6-2-2.webp\" alt=\"\" class=\"wp-image-2729\"\/><\/figure>\n\n\n\n<p><em>Figure 6 Atmos targeted countries<\/em><br><br><strong>Analysis of recent Atmos sample<\/strong><br><br>The sample we\u2019ll analyse today was discovered earlier this month:<br><br><strong>Sample detail:<\/strong><br><br>MD5: 4b9660441358264519b645e91a485e0b<br><br>Size: 264 KB<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"367\" height=\"87\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/7-2-2.webp\" alt=\"\" class=\"wp-image-2730\"\/><\/figure>\n\n\n\n<p><em>Figure 7 File detail<\/em><br><br><strong>File Analysis<\/strong><br><br>In our controlled environment, we checked the sample\u2019s strings and found mostly junk:<br><br>\u2022&nbsp;&nbsp; &nbsp;000000019115 &nbsp; 000000419D15 &nbsp; &nbsp; &nbsp;0 &nbsp; yGK;G<br><br>\u2022&nbsp;&nbsp; &nbsp;000000019253 &nbsp; 000000419E53 &nbsp; &nbsp; &nbsp;0 &nbsp; GK;Y?gK<br><br>\u2022&nbsp;&nbsp; &nbsp;00000001935F &nbsp; 000000419F5F &nbsp; &nbsp; &nbsp;0 &nbsp; 8jG+xY<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000194A3 &nbsp; 00000041A0A3 &nbsp; &nbsp; &nbsp;0 &nbsp; GsIc9<br><br>\u2022&nbsp;&nbsp; &nbsp;000000019836 &nbsp; 00000041A436 &nbsp; &nbsp; &nbsp;0 &nbsp; |G+xI<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000198FE &nbsp; 00000041A4FE &nbsp; &nbsp; &nbsp;0 &nbsp; EG(8&#8242;<br><br>\u2022&nbsp;&nbsp; &nbsp;000000019D5C &nbsp; 00000041A95C &nbsp; &nbsp; &nbsp;0 &nbsp; yGK;G<br><br>We then debugged the code and started to uncover important strings:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"691\" height=\"525\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/8-1-2.webp\" alt=\"\" class=\"wp-image-2731\"\/><\/figure>\n\n\n\n<p><em>Figure 8 Strings in the memory<\/em><br><br>The above image shows important identifying strings which our researchers found were related to earlier Atmos samples for which we already had the yara signatures. Those strings are below:<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_init@4&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_uninit@0&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_start@8&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_stop@0&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_wait@0&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;_hvnc_work@0&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;UNICODE &#8220;css,js,ico,jpg,png,gif,wav,mp3,avi,mov,swf,flv&#8221;<br><br>\u2022&nbsp;&nbsp; &nbsp;ASCII &#8220;533D9226E4C1CE0A9815DBEB19235AE4&#8221;<br><br>In this set, we found \u201c_hvnc_init\u201d which is just hidden vnc routine. Below, we checked this against the earlier sample\u2019s yara rule:<br><br>\/\/ Hidden VNC identifiers<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC1 = &#8220;_hvnc_init@4&#8221; wide ascii<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC2 = &#8220;_hvnc_uninit@0&#8221; wide ascii<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC3 = &#8220;_hvnc_start@8&#8221; wide ascii<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC4 = &#8220;_hvnc_stop@0&#8221; wide ascii<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC5 = &#8220;_hvnc_wait@0&#8221; wide ascii<br><br>&nbsp; &nbsp; &nbsp; &nbsp; $VNC6 = &#8220;_hvnc_work@0&#8221; wide asci&nbsp;&nbsp; &nbsp;<br><br>Our sample\u2019s strings also contained browser identifiers:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1020\" height=\"120\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/9-1-2.webp\" alt=\"\" class=\"wp-image-2732\"\/><\/figure>\n\n\n\n<p><em>Figure 9 Browser identifiers<\/em><br><br>In addition to browser identifiers, we uncovered strings related to social networking sites Twitter, Facebook and Instagram, as well as the details of botnet domains from Russia, Ukraine, and Kazakhstan.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"443\" height=\"119\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/10-1-2.webp\" alt=\"\" class=\"wp-image-2733\"\/><\/figure>\n\n\n\n<p><em>Figure 10 Botnet and Domains from Russia and its neighbouring countries<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"647\" height=\"651\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-1-2.webp\" alt=\"\" class=\"wp-image-2734\" srcset=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-1-2.webp 647w, https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/11-1-2-150x150.webp 150w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/figure>\n\n\n\n<p><em>Figure 11 Sites found inside the code<\/em><br><br>The actual files created, and the domains contacted, were found inside the code itself:<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F914 &nbsp;&nbsp;&nbsp; &nbsp;00 00 00 00 00 00 00 00 00 00 57 6F 63 6F 76 79 &nbsp; &nbsp; &nbsp;&#8230;&#8230;&#8230;.Wocovy<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F924 &nbsp;&nbsp;&nbsp; &nbsp;61 74 76 61 65 5C 79 7A 69 68 6D 6F 73 61 66 69 &nbsp; &nbsp; atvae\\yzihmosafi<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F934 &nbsp;&nbsp; &nbsp; 2E 65 78 65 00 00 00 00 4B 69 69 78 73 79 6F 68 &nbsp; &nbsp; .exe&#8230;.Kiixsyoh<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F944 &nbsp;&nbsp; &nbsp; 6D 75 6F 68 5C 79 62 68 6F 79 77 70 65 2E 79 64 &nbsp; &nbsp; muoh\\ybhoywpe.yd<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F954 &nbsp;&nbsp;&nbsp; &nbsp;73 00 00 00 00 00 45 66 62 6F 69 64 65 76 6B 5C &nbsp; &nbsp; &nbsp;s&#8230;..Efboidevk\\<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F964 &nbsp;&nbsp;&nbsp; &nbsp;6C 69 75 77 64 65 70 79 77 2E 67 61 74 00 00 00 &nbsp; &nbsp; &nbsp;liuwdepyw.gat&#8230;<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F974 &nbsp;&nbsp;&nbsp; &nbsp;00 00 00 00 43 6F 70 61 61 78 75 73 00 00 00 00 &nbsp; &nbsp; &nbsp;&#8230;.Copaaxus&#8230;.<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F994 &nbsp;&nbsp;&nbsp; &nbsp;00 00 45 71 66 79 69 7A 00 00 00 00 4F 76 6F 74 &nbsp; &nbsp; &nbsp; &nbsp;&#8230;Eqfyiz&#8230;.Ovot<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F9A4 &nbsp;&nbsp; &nbsp; 6D 6F 68 00 00 00 4F 6B 65 71 69 00 00 00 00 00 &nbsp; &nbsp; &nbsp;moh&#8230;Okeqi&#8230;..<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F9B4 &nbsp;&nbsp;&nbsp; &nbsp;42 69 72 6F 78 79 62 65 00 00 5A 75 6F 6B 6F 7A &nbsp; &nbsp; &nbsp;Biroxybe..Zuokoz<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F9C4 &nbsp;&nbsp;&nbsp; &nbsp;74 79 00 00 49 6D 76 65 63 6F 76 6F 75 00 18 F2 &nbsp; &nbsp; ty..Imvecovou.\u00f2<br><br>\u2022&nbsp;&nbsp; &nbsp;0012F9D4 &nbsp;&nbsp;&nbsp; &nbsp;44 55 AA 54 3C 7A 13 00 B8 52 75 6E 6E 69 6E 67 &nbsp; &nbsp; DU\u00aaT&lt;z.\u00b8Running<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA34 &nbsp;&nbsp;&nbsp; &nbsp;74 74 70 3A 2F 2F 72 65 73 76 73 68 6F 70 2E 72 &nbsp; &nbsp; &nbsp; ttp:\/\/resvshop.r<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA44 &nbsp;&nbsp;&nbsp; &nbsp;75 2F 64 45 46 79 70 34 73 4A 50 5A 66 70 2F 66 &nbsp; &nbsp; &nbsp; u\/dEFyp4sJPZfp\/f<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA54 &nbsp;&nbsp;&nbsp; &nbsp;69 6C 65 2E 70 68 70 7C 66 69 00 00 00 00 73 61 &nbsp; &nbsp; &nbsp; ile.php|fi&#8230;.sa<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA64 &nbsp;&nbsp;&nbsp; &nbsp;2E 78 6D 6C 00 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;.xml.<br><br><strong>Dynamic analysis<\/strong><br><br>We switched to dynamic analysis in order to observe the complete behaviour of the sample. First, we witnessed the file deleting itself after execution:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"187\" height=\"95\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/12-1-1.webp\" alt=\"\" class=\"wp-image-2735\"\/><\/figure>\n\n\n\n<p><em>Figure 12 Duplicate file created in %appdata%<\/em><\/p>\n\n\n\n<p>Then the following registry traces were created in the system:<br><br>\u2022&nbsp;&nbsp; &nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Eqfyiz<br><br>\u2022&nbsp;&nbsp; &nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts\\Active Directory GC<br><br>\u2022&nbsp;&nbsp; &nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts\\Bigfoot<br><br>\u2022&nbsp;&nbsp; &nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts\\VeriSign<br><br>\u2022&nbsp;&nbsp; &nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts\\WhoWhere<br><br>Below is the sample\u2019s auto start entry:<br><br>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;Copaaxus&#8221;<br><br>Type: REG_SZ<br><br>Data: &#8220;C:\\Documents and Settings\\Application Data\\Wocovyatvae\\yzihmosafi.exe&#8221;<br><br>The physical location of the file is our original file\u2019s duplicate MD5. This registry enables the malware to maintain persistence.<br><br>Below are the folders the malware creates:<br><br>\u2022&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\Application Data\\Efboidevk<br><br>\u2022&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\Application Data\\Kiixsyohmuoh<br><br>\u2022&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\Application Data\\Microsoft\\Address Book<br><br>\u2022&nbsp;&nbsp; &nbsp;c:\\Documents and Settings\\Application Data\\Wocovyatvae<br><br>Inside the \u2018Microsoft\u2019 folder, under the newly created \u2018Address Book\u2019 folder, is an address book file %username%.wab.&nbsp;<br><br><strong>IOC Details:<\/strong><br><br>Based on our dynamic analysis we found the registry traces, folders and file traces created. These traces can be used to detect the malware\u2019s presence in the host:<br><br><strong>URLs:<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;0012FC90 &nbsp;&nbsp; &nbsp;68 74 74 70 3A 2F 2F 31 39 33 2E 30 2E 31 37 38 &nbsp;&nbsp; &nbsp;http:\/\/193.0.178<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FCA0 &nbsp;&nbsp; &nbsp;2E 31 38 2F 64 45 46 79 70 34 73 4A 50 5A 66 70 &nbsp;&nbsp; &nbsp;.18\/dEFyp4sJPZfp<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FCB0 &nbsp;&nbsp; &nbsp;2F 66 69 6C 65 2E 70 68 70 7C 66 69 6C 65 3D 75 &nbsp;&nbsp; &nbsp;\/file.php|file=u<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FCC0 &nbsp;&nbsp; &nbsp;73 61 2E 78 6D 6C &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;sa.xml<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA34 &nbsp;&nbsp;&nbsp; &nbsp;74 74 70 3A 2F 2F 72 65 73 76 73 68 6F 70 2E 72 &nbsp; &nbsp; &nbsp; ttp:\/\/resvshop.r<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA44 &nbsp;&nbsp;&nbsp; &nbsp;75 2F 64 45 46 79 70 34 73 4A 50 5A 66 70 2F 66 &nbsp; &nbsp; &nbsp; u\/dEFyp4sJPZfp\/f<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA54 &nbsp;&nbsp;&nbsp; &nbsp;69 6C 65 2E 70 68 70 7C 66 69 00 00 00 00 73 61 &nbsp; &nbsp; &nbsp; ile.php|fi&#8230;.sa<br><br>\u2022&nbsp;&nbsp; &nbsp;0012FA64 &nbsp;&nbsp;&nbsp; &nbsp;2E 78 6D 6C 00 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;.xml.<br><br>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/193.0.178(.)18\/dEFyp4sJPZfp\/file.php|file=usa.xml<br><br>\u2022&nbsp;&nbsp; &nbsp;hxxp:\/\/resvshop(.)ru\/dEFyp4sJPZfp\/file.php|file=usa.xml<br><br><strong>Yara rules for detection:<\/strong><br><br>$LKEY = &#8220;533D9226E4C1CE0A9815DBEB19235AE4&#8221; wide ascii<br><br>\/\/ TokenSpy identifiers<br><br>&nbsp;$TokenSpy1 = &#8220;X-TS-Rule-Name: %s&#8221; wide ascii<br><br>&nbsp;$TokenSpy2 = &#8220;X-TS-Rule-PatternID: %u&#8221; wide ascii<br><br>&nbsp;$TokenSpy3 = &#8220;X-TS-BotID: %s&#8221; wide ascii<br><br>&nbsp;$TokenSpy4 = &#8220;X-TS-Domain: %s&#8221; wide ascii<br><br>&nbsp;$TokenSpy5 = &#8220;X-TS-SessionID: %s&#8221; wide ascii<br><br>&nbsp;$TokenSpy6 = &#8220;X-TS-Header-Cookie: %S&#8221; wide ascii<br><br>&nbsp;$TokenSpy7 = &#8220;X-TS-Header-Referer: %S&#8221; wide ascii<br><br>&nbsp;$TokenSpy8 = &#8220;X-TS-Header-AcceptEncoding: %S&#8221; wide ascii<br><br>&nbsp;$TokenSpy9 = &#8220;X-TS-Header-AcceptLanguage: %S&#8221; wide ascii<br><br>&nbsp;$TokenSpy10 = &#8220;X-TS-Header-UserAgent: %S&#8221; wide ascii<br><br>\/\/ Browser identifiers<br><br>&nbsp;$WebBrowser1 = &#8220;nspr4.dll&#8221; wide ascii<br><br>&nbsp;$WebBrowser2 = &#8220;nss3.dll&#8221; wide ascii<br><br>&nbsp;$WebBrowser3 = &#8220;chrome.dll&#8221; wide ascii<br><br>&nbsp;$WebBrowser4 = &#8220;Internet Explorer&#8221; wide ascii<br><br>&nbsp;$WebBrowser5 = &#8220;Firefox&#8221; wide ascii<br><br>&nbsp;$WebBrowser6 = &#8220;Chrome&#8221; wide ascii<br><br>&nbsp;\/\/ Hidden VNC identifiers<br><br>&nbsp;$VNC1 = &#8220;_hvnc_init@4&#8221; wide ascii<br><br>&nbsp;$VNC2 = &#8220;_hvnc_uninit@0&#8221; wide ascii<br><br>&nbsp;$VNC3 = &#8220;_hvnc_start@8&#8221; wide ascii<br><br>&nbsp;$VNC4 = &#8220;_hvnc_stop@0&#8221; wide ascii<br><br>&nbsp;$VNC5 = &#8220;_hvnc_wait@0&#8221; wide ascii<br><br>&nbsp;$VNC6 = &#8220;_hvnc_work@0&#8221; wide asci<br><br>This set of strings can also be used to detect the malware\u2019s presence in the host.&nbsp;<br><br><strong>Conclusion<\/strong><br><br>We recommend blocking the malicious domain in the proxy and firewall. The above yara rules can also be used to perform a scan on host machines.&nbsp;<br><br>In a SOC perspective, it is highly recommended to add the malicious domains to the threat intelligence feed so alerts can be created if any events match with the presence of those malicious domains in the network.<br><br>&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version:1.0 StartHTML:000000276 EndHTML:000020624 StartFragment:000007074 EndFragment:000020556 StartSelection:000007074 EndSelection:000020540 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=85&amp;url=ZeuS&rsquo;%20grandson%20Atmos%20picks%20up%20the%20family%20trade LMNTRIX Labs LMNTRIX Labs In the malware pantheon, one of the most highly revered strains is ZeuS &ndash; a banking trojan that was particularly virulent in the mid-to-late 2000s. The source code was being sold online for years until it was leaked in 2011 which led to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2736,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-2719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=2719"}],"version-history":[{"count":4,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions"}],"predecessor-version":[{"id":4307,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/2719\/revisions\/4307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/2736"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=2719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=2719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=2719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}