A new piece of malware dubbed
The malware hides malicious network traffic using SOCKS5 proxies that set up on compromised PCs.
The use of SOCKS5 proxies was observed several times by malware researchers, it allows to avoid detection bypassing security measures that identify malicious traffic. SOCKS5 proxies also allow hiding Command & Control servers making takedowns.
“
“
The most recently analyzed
2019-05-01: {New] #Malware #Loader/Installer "start2" Arg
— Vitali Kremez (@VK_Intel) May 2, 2019| #Signed
[BEAT GOES ON LIMITED]
Emsisoft Anti-Malwarea2guard.exe Checker |
“start2” Thread Argument <-> task scheduler
h/t @malwrhunterteam
MD5: 452f68dd3aaf36c37ecb1c49e86814f4 pic.twitter.com/EmKn1EXQY8
The experts spotted a variant of the
Another campaign from June 6 was dropping a PowerEnum PowerShell script that threat actors use for device fingerprinting and data
In July, experts discovered a new sample of the
“Since this proxy malware was being used in multiple separate campaigns, Proofpoint researchers believe it was very likely that it was being sold in an underground marketplace.” continues the analysis. “Moreover, we found an advertisement from April 2, 2019, on an underground forum that described a malware named “socks5
Researchers at Proofpoint believe that the proxy malware is available for sale via an underground marketplace, an advertisement on a Russian crime forum promotes a malware called “socks5
“The synergy between SystemBC as a malicious proxy and mainstream malware creates new challenges for defenders relying on network edge detections to intercept and mitigate threats like banking Trojans.” concludes the report that also includes IoCs and other details.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]