Malware

Retefe Banking Trojan resurfaces in the threat landscape with innovations

Security experts at Proofpoint warn of the resurfacing of the Retefe banking Trojan that implements new techniques to avoid detection.

The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection.

The new variant resurfaced in April, it uses the stunnel encrypted tunneling mechanism and abuses a legitimate shareware app.

One of the major changes in the new variant is the abandon of Tor for its communications and the abuse of a legitimate shareware application.

Unlike other banking Trojan that leverages on injection mechanisms, Retefe routes online banking traffic intended for targeted banks through a proxy. Retefe campaigns observed in the past were focused on customers in Austria, Sweden, Switzerland, and the UK.

The attack chain starts with spam messages using zipped JavaScript and weaponized Microsoft Word documents. Below key findings of the analysis published by Proofpoint:

  • Using stunnel instead of TOR to secure its proxy redirection and command and control communications
  • The use of Smoke Loader rather than sLoad as an intermediate loader
  • The abuse of a shareware application known as “Convert PDF to Word Plus 1.0”; this is a Python script that has been packaged as an executable using PyInstaller and packed into an archive using the UPX packing engine.

Retefe remained quite dormant for more than a year (except for a few attacks in 2018), the last major campaign was observed in 2017, when threat actors added the NSA exploit EternalBlue exploit code to the malware to improve its spreading capabilities.

Since April the banking Trojan was involved in attacks on Swiss and German users with both a Windows and macOS version.

Threat actors included in the new variant an application called Stunnel, into the proceedings. Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code.

“Retefe extracts stunnel via a compressed archive in place of the usual TOR Socat proxy. In addition to the use of the decoy abused shareware, this is the most significant observed change to Retefe’s behavior, along with the use of Smoke Loader.” reads the analysis published by Proofpoint. “We suspect that the use of a dedicated tunnel rather than Tor makes for a more secure connection because it eliminates the possibility of snooping on the hops between Tor nodes.”

Secure Tunneling (stunnel) replaces Tor because the latter is considered a noiser protocol that would be easier to detect in an enterprise environment than stunnel.

The latest variant of the Retefe banking Trojan also included the abuse of a legitimate shareware application known as “Convert PDF to Word Plus 1.0”. The application is a Python script that has been packaged as an executable using PyInstaller and packed into an archive using the UPX packing engine.

The malicious script uses a certificate issued by DigiCert.

In the spam campaigns observed by the experts, attackers trick users into installing the application in order to correctly view the attached document. When the victim launches the application, the Python script writes two files to the victim machine. One is a legitimate installer for the Convert PDF to Word Plus application and is executed as a decoy, while the other is a loader for the banking Trojan. The loader extracts the files using the 7-Zip file-compression utility and stunnel from its resources, then decrypts and executes the main Retefe JavaScript code.

In one campaign uncovered by Proofpoint in April, experts observed attackers sending spam emails to Swiss users and used an Object Linking and Embedding (OLE) package to deliver Smoke Loader.

Campaigns targeting macOS users leverage digitally signed versions of fake Adobe Installers used to deliver their malware,

“By using signed binaries, actors attempt to bypass the macOS internal Gatekeeper security application, which checks if applications are signed by a valid developer certificate before running,” continues Proofpoint.

“Developers appear to have updated key features of the Trojan and are employing new distribution mechanisms…after a fairly lengthy absence from the landscape. As with many types of malware, developers continue to innovate, identifying new, more effective ways to infect victims and steal personal information to better monetize their attacks.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Retefe banking Trojan, cybercrime)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

4 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

6 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

7 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

9 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

11 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

22 hours ago

This website uses cookies.