id
stringlengths
1
4
tokens
sequencelengths
3
478
ner_tags
sequencelengths
3
478
800
[ "It", "then", "calls", "a", "routine", "that", "adds", "a", "code", "section", "to", "a", "target", "module", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
801
[ "This", "section", "will", "contain", "a", "fake", "export", "table", "mimicking", "the", "same", "export", "table", "of", "the", "original", "system", "DLL", "chosen", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
802
[ "At", "the", "time", "of", "writing", ",", "the", "dropper", "supports", "aepic.dll", ",", "sspisrv.dll", ",", "ftllib.dll", ",", "and", "userenv.dll", "to", "host", "the", "malicious", "FinFisher", "payload", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 0, 10, 0, 10, 10, 0, 10, 10, 10, 10, 1, 10, 10 ]
803
[ "Finally", ",", "a", "new", "Windows", "service", "is", "created", "with", "the", "service", "path", "pointing", "to", "the", "candidate", ".exe", "located", "in", "this", "new", "directory", "together", "with", "the", "freshly", "created", ",", "benign-looking", "DLL", "." ]
[ 10, 10, 10, 10, 3, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
804
[ "In", "this", "way", ",", "when", "the", "service", "runs", "during", "boot", ",", "the", "original", "Windows", "executable", "is", "executed", "from", "a", "different", "location", "and", "it", "will", "automatically", "load", "and", "map", "the", "malicious", "DLL", "inside", "its", "address", "space", ",", "instead", "of", "using", "the", "genuine", "system", "library", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
805
[ "This", "routine", "is", "a", "form", "of", "generic", "and", "variable", "generator", "of", "DLL", "side-loading", "combinations", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
806
[ "Figure", "10", "." ]
[ 10, 10, 10 ]
807
[ "Windows", "Defender", "ATP", "timeline", "can", "pinpoint", "the", "service", "DLL", "side-loading", "trick", "(", "in", "this", "example", ",", "using", "fltlib.dll", ")", "." ]
[ 3, 8, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10 ]
808
[ "In", "the", "past", ",", "we", "have", "seen", "other", "activity", "groups", "like", "LEAD", "employ", "a", "similar", "attacker", "technique", "named", "β€œ", "proxy-library", "”", "to", "achieve", "persistence", ",", "but", "not", "with", "this", "professionalism", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
809
[ "The", "said", "technique", "brings", "the", "advantage", "of", "avoiding", "auto-start", "extensibility", "points", "(", "ASEP", ")", "scanners", "and", "programs", "that", "checks", "for", "binaries", "installed", "as", "service", "(", "for", "the", "latter", ",", "the", "service", "chosen", "by", "FinFisher", "will", "show", "up", "as", "a", "clean", "Windows", "signed", "binary", ")", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 3, 10, 10, 10, 10 ]
810
[ "The", "malware", "cleans", "the", "system", "event", "logs", "using", "OpenEventLog/ClearEventLog", "APIs", ",", "and", "then", "terminates", "the", "setup", "procedure", "with", "a", "call", "to", "StartService", "to", "run", "the", "stage", "4", "malware", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
811
[ "Figure", "11", "." ]
[ 10, 10, 10 ]
812
[ "The", "DLL", "side-loaded", "stage", "4", "malware", "mimicking", "a", "real", "export", "table", "to", "avoid", "detection", "Stage", "4", ":", "The", "memory", "loader", "–", "Fun", "injection", "with", "GDI", "function", "hijacking", "Depending", "on", "how", "stage", "4", "was", "launched", ",", "two", "different", "things", "may", "happen", ":", "In", "the", "low-integrity", "case", "(", "under", "UAC", ")", "the", "installer", "simply", "injects", "the", "stage", "5", "malware", "into", "the", "bogus", "explorer.exe", "process", "started", "earlier", "and", "terminates", "In", "the", "high-integrity", "case", "(", "with", "administrative", "privileges", "or", "after", "UAC", "bypass", ")", ",", "the", "code", "searches", "for", "the", "process", "hosting", "the", "Plug", "and", "Play", "service", "(", "usually", "svchost.exe", ")", "loaded", "in", "memory", "and", "injects", "itself", "into", "it", "For", "the", "second", "scenario", ",", "the", "injection", "process", "works", "like", "this", ":", "The", "malware", "opens", "the", "target", "service", "process", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
813
[ "It", "allocates", "and", "fills", "four", "chunks", "of", "memory", "inside", "the", "service", "process", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
814
[ "One", "chunk", "contains", "the", "entire", "malware", "DLL", "code", "(", "without", "PE", "headers", ")", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
815
[ "Another", "chunk", "is", "used", "to", "copy", "a", "basic", "Ntdll", "and", "Kernel32", "import", "address", "table", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
816
[ "Two", "chunks", "are", "filled", "with", "an", "asynchronous", "procedure", "call", "(", "APC", ")", "routine", "code", "and", "a", "stub", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
817
[ "It", "opens", "the", "service", "thread", "of", "the", "service", "process", "and", "uses", "the", "ZwQueueApcThread", "native", "API", "to", "inject", "an", "APC", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10 ]
818
[ "The", "APC", "routine", "creates", "a", "thread", "in", "the", "context", "of", "the", "svchost.exe", "process", "that", "will", "map", "and", "execute", "the", "stage", "5", "malware", "into", "the", "winlogon.exe", "process", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10 ]
819
[ "The", "injection", "method", "used", "for", "winlogon.exe", "is", "also", "interesting", "and", "quite", "unusual", "." ]
[ 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10 ]
820
[ "We", "believe", "that", "this", "method", "is", "engineered", "to", "avoid", "trivial", "detection", "of", "process", "injection", "using", "the", "well-detected", "CreateRemoteThread", "or", "ZwQueueApcThread", "API", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 0, 10, 10 ]
821
[ "The", "malware", "takes", "these", "steps", ":", "Check", "if", "the", "system", "master", "boot", "record", "(", "MBR", ")", "contains", "an", "infection", "marker", "(", "0xD289C989C089", "8-bytes", "value", "at", "offset", "0x2C", ")", ",", "and", ",", "if", "so", ",", "terminate", "itself", "Check", "again", "if", "the", "process", "is", "attached", "to", "a", "debugger", "(", "using", "the", "techniques", "described", "previously", ")", "Read", ",", "decrypt", ",", "and", "map", "the", "stage", "5", "malware", "(", "written", "in", "the", "previous", "stage", "in", "msvcr90.dll", ")", "Open", "winlogon.exe", "process", "Load", "user32.dll", "system", "library", "and", "read", "the", "KernelCallbackTable", "pointer", "from", "its", "own", "process", "environment", "block", "(", "PEB", ")", "(", "Note", ":", "The", "KernelCallbackTable", "points", "to", "an", "array", "of", "graphic", "functions", "used", "by", "Win32", "kernel", "subsystem", "module", "win32k.sys", "as", "call-back", "into", "user-mode", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 0, 10, 10, 0, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10 ]
822
[ ")", "Calculate", "the", "difference", "between", "this", "pointer", "and", "the", "User32", "base", "address", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
823
[ "Copy", "the", "stage", "5", "DLL", "into", "winlogon.exe", "Allocate", "a", "chunk", "of", "memory", "in", "winlogon.exe", "process", "and", "copy", "the", "same", "APC", "routine", "seen", "previously", "Read", "and", "save", "the", "original", "pointer", "of", "the", "__fnDWORD", "internal", "User32", "routine", "(", "located", "at", "offset", "+0x10", "of", "the", "KernelCallbackTable", ")", "and", "replace", "this", "pointer", "with", "the", "address", "of", "the", "APC", "stub", "routine", "After", "this", "function", "pointer", "hijacking", ",", "when", "winlogon.exe", "makes", "any", "graphical", "call", "(", "GDI", ")", ",", "the", "malicious", "code", "can", "execute", "without", "using", "CreateRemoteThread", "or", "similar", "triggers", "that", "are", "easily", "detectable", "." ]
[ 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
824
[ "After", "execution", "it", "takes", "care", "of", "restoring", "the", "original", "KernelCallbackTable", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
825
[ "Stage", "5", ":", "The", "final", "loader", "takes", "control", "The", "stage", "5", "malware", "is", "needed", "only", "to", "provide", "one", "more", "layer", "of", "obfuscation", ",", "through", "the", "VM", ",", "of", "the", "final", "malware", "payload", "and", "to", "set", "up", "a", "special", "Structured", "Exception", "Hander", "routine", ",", "which", "is", "inserted", "as", "Wow64PrepareForException", "in", "Ntdll", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
826
[ "This", "special", "exception", "handler", "is", "needed", "to", "manage", "some", "memory", "buffers", "protection", "and", "special", "exceptions", "that", "are", "used", "to", "provide", "more", "stealthy", "execution", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
827
[ "After", "the", "VM", "code", "has", "checked", "again", "the", "user", "environment", ",", "it", "proceeds", "to", "extract", "and", "execute", "the", "final", "un-obfuscated", "payload", "sample", "directly", "into", "winlogon.exe", "(", "alternatively", ",", "into", "explorer.exe", ")", "process", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 0, 10, 10, 10 ]
828
[ "After", "the", "payload", "is", "extracted", ",", "decrypted", ",", "and", "mapped", "in", "the", "process", "memory", ",", "the", "malware", "calls", "the", "new", "DLL", "entry", "point", ",", "and", "then", "the", "RunDll", "exported", "function", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
829
[ "The", "latter", "implements", "the", "entire", "spyware", "program", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10 ]
830
[ "Stage", "6", ":", "The", "payload", "is", "a", "modular", "spyware", "framework", "for", "further", "analysis", "Our", "journey", "to", "deobfuscating", "FinFisher", "has", "allowed", "us", "to", "uncover", "the", "complex", "anti-analysis", "techniques", "used", "by", "this", "malware", ",", "as", "well", "as", "to", "use", "this", "intel", "to", "protect", "our", "customers", ",", "which", "is", "our", "top", "priority", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
831
[ "Analysis", "of", "the", "additional", "spyware", "modules", "is", "future", "work", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
832
[ "It", "is", "evident", "that", "the", "ultimate", "goal", "of", "this", "program", "is", "to", "steal", "information", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
833
[ "The", "malware", "architecture", "is", "modular", ",", "which", "means", "that", "it", "can", "execute", "plugins", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
834
[ "The", "plugins", "are", "stored", "in", "its", "resource", "section", "and", "can", "be", "protected", "by", "the", "same", "VM", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
835
[ "The", "sample", "we", "analyzed", "in", "October", ",", "for", "example", ",", "contains", "a", "plugin", "that", "is", "able", "to", "spy", "on", "internet", "connections", ",", "and", "can", "even", "divert", "some", "SSL", "connections", "and", "steal", "data", "from", "encrypted", "traffic", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
836
[ "Some", "FinFisher", "variants", "incorporate", "an", "MBR", "rootkit", ",", "the", "exact", "purpose", "of", "which", "is", "not", "clear", "." ]
[ 10, 1, 10, 10, 10, 0, 5, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
837
[ "Quite", "possibly", ",", "this", "routine", "targets", "older", "platforms", "like", "Windows", "7", "and", "machines", "not", "taking", "advantage", "of", "hardware", "protections", "like", "UEFI", "and", "SecureBoot", ",", "available", "on", "Windows", "10", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 10 ]
838
[ "Describing", "this", "additional", "piece", "of", "code", "in", "detail", "is", "outside", "the", "scope", "of", "this", "analysis", "and", "may", "require", "a", "new", "dedicated", "blog", "post", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
839
[ "Defense", "against", "FinFisher", "Exposing", "as", "much", "of", "FinFisher", "’", "s", "riddles", "as", "possible", "during", "this", "painstaking", "analysis", "has", "allowed", "us", "to", "ensure", "our", "customers", "are", "protected", "against", "this", "advanced", "piece", "of", "malware", "." ]
[ 10, 10, 1, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
840
[ "Windows", "10", "S", "devices", "are", "naturally", "protected", "against", "FinFisher", "and", "other", "threats", "thanks", "to", "the", "strong", "code", "integrity", "policies", "that", "don", "’", "t", "allow", "unknown", "unsigned", "binaries", "to", "run", "(", "thus", "stopping", "FinFisher", "’", "s", "PE", "installer", ")", "or", "loaded", "(", "blocking", "FinFisher", "’", "s", "DLL", "persistence", ")", "." ]
[ 3, 8, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10 ]
841
[ "On", "Windows", "10", ",", "similar", "code", "integrity", "policies", "can", "be", "configured", "using", "Windows", "Defender", "Application", "Control", "." ]
[ 10, 3, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 8, 8, 10 ]
842
[ "Office", "365", "Advanced", "Threat", "Protection", "secures", "mailboxes", "from", "email", "campaigns", "that", "use", "zero-day", "exploits", "to", "deliver", "threats", "like", "FinFisher", "." ]
[ 3, 8, 8, 8, 8, 10, 10, 10, 10, 10, 10, 10, 4, 9, 10, 10, 10, 10, 1, 10 ]
843
[ "Office", "365", "ATP", "blocks", "unsafe", "attachments", ",", "malicious", "links", ",", "and", "linked-to", "files", "using", "time-of-click", "protection", "." ]
[ 3, 8, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
844
[ "Using", "intel", "from", "this", "research", ",", "we", "have", "made", "Office", "365", "ATP", "more", "resistant", "to", "FinFisher", "’", "s", "anti-sandbox", "checks", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 8, 10, 10, 10, 1, 10, 10, 10, 10, 10 ]
845
[ "Generic", "detections", ",", "advanced", "behavioral", "analytics", ",", "and", "machine", "learning", "technologies", "in", "Windows", "Defender", "Advanced", "Threat", "Protection", "detect", "FinFisher", "’", "s", "malicious", "behavior", "throughout", "the", "attack", "kill", "chain", "and", "alert", "SecOps", "personnel", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 8, 8, 8, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
846
[ "Windows", "Defender", "ATP", "also", "integrates", "with", "the", "Windows", "protection", "stack", "so", "that", "protections", "from", "Windows", "Defender", "AV", "and", "Windows", "Defender", "Exploit", "Guard", "are", "reported", "in", "Windows", "Defender", "ATP", "portal", ",", "enabling", "SecOps", "personnel", "to", "centrally", "manage", "security", ",", "and", "as", "well", "as", "promptly", "investigate", "and", "respond", "to", "hostile", "activity", "in", "the", "network", "." ]
[ 3, 8, 8, 10, 10, 10, 10, 3, 10, 10, 10, 10, 10, 10, 3, 8, 8, 10, 3, 8, 8, 8, 10, 10, 10, 3, 8, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
847
[ "We", "hope", "that", "this", "writeup", "of", "our", "journey", "through", "all", "the", "multiple", "layers", "of", "protection", ",", "obfuscation", ",", "and", "anti-analysis", "techniques", "of", "FinFisher", "will", "be", "useful", "to", "other", "researchers", "studying", "this", "malware", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
848
[ "We", "believe", "that", "an", "industry-wide", "collaboration", "and", "information-sharing", "is", "important", "in", "defending", "customers", "against", "this", "complex", "piece", "of", "malware", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
849
[ "TUESDAY", ",", "APRIL", "9", ",", "2019", "Gustuff", "banking", "botnet", "targets", "Australia", "EXECUTIVE", "SUMMARY", "Cisco", "Talos", "has", "uncovered", "a", "new", "Android-based", "campaign", "targeting", "Australian", "financial", "institutions", "." ]
[ 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 10, 2, 7, 10, 10, 10, 10, 3, 10, 10, 10, 10, 10, 10 ]
850
[ "As", "the", "investigation", "progressed", ",", "Talos", "came", "to", "understand", "that", "this", "campaign", "was", "associated", "with", "the", "\"", "ChristinaMorrow", "''", "text", "message", "spam", "scam", "previously", "spotted", "in", "Australia", "." ]
[ 10, 10, 10, 10, 10, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
851
[ "Although", "this", "malware", "'s", "credential-harvest", "mechanism", "is", "not", "particularly", "sophisticated", ",", "it", "does", "have", "an", "advanced", "self-preservation", "mechanism", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
852
[ "Even", "though", "this", "is", "not", "a", "traditional", "remote", "access", "tool", "(", "RAT", ")", ",", "this", "campaign", "seems", "to", "target", "mainly", "private", "users", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
853
[ "Aside", "from", "the", "credential", "stealing", ",", "this", "malware", "also", "includes", "features", "like", "the", "theft", "of", "users", "'", "contact", "list", ",", "collecting", "phone", "numbers", "associated", "names", ",", "and", "files", "and", "photos", "on", "the", "device", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
854
[ "But", "that", "does", "n't", "mean", "companies", "and", "organizations", "are", "out", "of", "the", "woods", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
855
[ "They", "should", "still", "be", "on", "the", "lookout", "for", "these", "kinds", "of", "trojans", ",", "as", "the", "attackers", "could", "target", "corporate", "accounts", "that", "contain", "large", "amounts", "of", "money", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
856
[ "The", "information", "collected", "by", "the", "malware", "and", "the", "control", "over", "the", "victim", "'s", "mobile", "device", "allows", "their", "operators", "to", "perform", "more", "complex", "social", "engineering", "attacks", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
857
[ "A", "motivated", "attacker", "can", "use", "this", "trojan", "to", "harvest", "usernames", "and", "passwords", "and", "then", "reuse", "them", "to", "login", "into", "the", "organization", "'s", "system", "where", "the", "victim", "works", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
858
[ "This", "is", "a", "good", "example", "where", "two-factor", "authentication", "based", "on", "SMS", "would", "fail", "since", "the", "attacker", "can", "read", "the", "SMS", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
859
[ "Corporations", "can", "protect", "themselves", "from", "these", "side-channel", "attacks", "by", "deploying", "client-based", "two-factor", "authentication", ",", "such", "as", "Duo", "Security", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 10 ]
860
[ "One", "of", "the", "most", "impressive", "features", "of", "this", "malware", "is", "its", "resilience", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
861
[ "If", "the", "command", "and", "control", "(", "C2", ")", "server", "is", "taken", "down", ",", "the", "malicious", "operator", "can", "still", "recover", "the", "malware", "control", "by", "sending", "SMS", "messages", "directly", "to", "the", "infected", "devices", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
862
[ "This", "makes", "the", "taking", "down", "and", "recovery", "of", "the", "network", "much", "harder", "and", "poses", "a", "considerable", "challenge", "for", "defenders", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
863
[ "THE", "CAMPAIGN", "The", "malware", "'s", "primary", "infection", "vector", "is", "SMS", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
864
[ "Just", "like", "the", "old-school", "mail", "worms", "that", "used", "the", "victim", "'s", "address", "book", "to", "select", "the", "next", "victims", ",", "this", "banking", "trojan", "'s", "activation", "cycle", "includes", "the", "exfiltration", "of", "the", "victim", "'s", "address", "book", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 3, 8, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
865
[ "The", "trojan", "will", "receive", "instructions", "from", "the", "C2", "to", "spread", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
866
[ "Spread", "command", "from", "C2", "The", "victim", "receives", "the", "command", "sendSMSMass", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
867
[ "Usually", ",", "this", "message", "targets", "four", "or", "five", "people", "at", "a", "time", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
868
[ "The", "body", "contains", "a", "message", "and", "URL", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10 ]
869
[ "Again", ",", "the", "concept", "is", "that", "new", "victims", "are", "more", "likely", "to", "install", "the", "malware", "if", "the", "SMS", "comes", "from", "someone", "they", "know", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
870
[ "When", "a", "victim", "tries", "to", "access", "the", "URL", "in", "the", "SMS", "body", ",", "the", "C2", "will", "check", "if", "the", "mobile", "device", "meets", "the", "criteria", "to", "receive", "the", "malware", "(", "see", "infrastructure", "section", ")", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
871
[ "If", "the", "device", "does", "not", "meet", "the", "criteria", ",", "it", "wo", "n't", "receive", "any", "data", ",", "otherwise", ",", "it", "will", "be", "redirected", "to", "a", "second", "server", "to", "receive", "a", "copy", "of", "the", "malware", "to", "install", "on", "their", "device", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
872
[ "The", "domain", "on", "this", "campaign", "was", "registered", "on", "Jan.", "19", ",", "2019", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
873
[ "However", ",", "Talos", "has", "identified", "that", "was", "used", "at", "least", "since", "November", "2018", "." ]
[ 10, 10, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
874
[ "During", "the", "investigation", ",", "Talos", "was", "also", "able", "to", "determine", "that", "the", "same", "infrastructure", "has", "been", "used", "to", "deploy", "similar", "campaigns", "using", "different", "versions", "of", "the", "malware", "." ]
[ 10, 10, 10, 10, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
875
[ "Distribution", "of", "victims", "." ]
[ 10, 10, 10, 10 ]
876
[ "Talos", "assess", "with", "high", "confidence", "that", "this", "campaign", "is", "targeting", "Australian", "financial", "institutions", "based", "on", "several", "factors", "." ]
[ 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
877
[ "Our", "Umbrella", "telemetry", "shows", "that", "the", "majority", "of", "the", "request", "comes", "from", "Australia", "and", "the", "majority", "of", "the", "phone", "numbers", "infected", "have", "the", "international", "indicative", "for", "Australia", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
878
[ "Finally", ",", "the", "specific", "overlays", "are", "designed", "for", "Australian", "financial", "institutions", ",", "and", "Australia", "is", "one", "of", "the", "geographic", "regions", "that", "is", "accepted", "by", "the", "C2", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
879
[ "DNS", "queries", "distribution", "over", "time", "The", "campaign", "does", "n't", "seem", "to", "be", "growing", "at", "a", "fast", "pace", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
880
[ "Our", "data", "shows", ",", "on", "average", ",", "about", "three", "requests", "per", "hour", "to", "the", "drop", "host", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
881
[ "This", "request", "is", "only", "made", "upon", "installation", ",", "but", "there", "is", "no", "guarantee", "that", "it", "will", "be", "installed", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
882
[ "This", "data", ",", "when", "analyzed", "with", "the", "number", "of", "commands", "to", "send", "SMSs", "that", "Talos", "received", "during", "the", "investigation", ",", "lead", "us", "to", "conclude", "that", "the", "malicious", "operator", "is", "aggressively", "spreading", "the", "malware", ",", "but", "that", "does", "n't", "seem", "to", "result", "in", "the", "same", "number", "of", "new", "infections", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
883
[ "Examples", "of", "the", "overlays", "available", "to", "the", "malware", "Above", ",", "you", "can", "see", "examples", "of", "the", "injections", "that", "distributed", "to", "the", "malware", "as", "part", "of", "this", "specific", "campaign", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
884
[ "While", "doing", "our", "investigation", "we", "were", "able", "to", "identify", "other", "malware", "packages", "with", "different", "names", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
885
[ "Some", "of", "these", "might", "have", "been", "used", "on", "old", "campaigns", "or", "were", "already", "prepared", "for", "new", "campaigns", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
886
[ "MALWARE", "TECHNICAL", "DETAILS", "During", "our", "investigation", ",", "researchers", "uncovered", "a", "malware", "known", "as", "\"", "Gustuff.", "''", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10 ]
887
[ "Given", "the", "lack", "of", "indicators", "of", "compromise", ",", "we", "decided", "to", "check", "to", "see", "if", "this", "was", "the", "same", "malware", "we", "had", "been", "researching", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
888
[ "Our", "Threat", "Intelligence", "and", "Interdiction", "team", "found", "the", "Gustuff", "malware", "being", "advertised", "in", "the", "Exploit.in", "forum", "as", "a", "botnet", "for", "rent", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10, 10, 10, 10, 0, 10, 10, 10, 10, 10, 10, 10 ]
889
[ "The", "seller", ",", "known", "as", "\"", "bestoffer", ",", "''", "was", ",", "at", "some", "point", ",", "expelled", "from", "the", "forum", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
890
[ "Gustuff", "advertising", "screenshot", "The", "companies", "advertised", "in", "the", "image", "above", "were", "from", "Australia", ",", "which", "matches", "up", "with", "the", "campaign", "we", "researched", "." ]
[ 1, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
891
[ "The", "screenshots", "provided", "by", "the", "author", "align", "with", "the", "advertised", "features", "and", "the", "features", "that", "we", "discovered", "while", "doing", "our", "analysis", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
892
[ "Admin", "panel", "The", "administration", "panel", "shows", "the", "application", "configuration", ",", "which", "matches", "the", "commands", "from", "the", "C2", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
893
[ "Country", "selection", "The", "administration", "console", "screenshots", "also", "show", "the", "ability", "to", "filter", "the", "results", "by", "country", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
894
[ "In", "this", "case", ",", "\"", "AU", "''", "is", "the", "code", "shown", ",", "which", "is", "Australia", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 7, 10, 10, 10, 10, 10, 10, 10, 10 ]
895
[ "Based", "on", "this", "information", ",", "Talos", "assesses", "with", "high", "confidence", "that", "the", "malware", "is", "the", "same", "and", "this", "is", ",", "in", "fact", ",", "the", "Gustuff", "malware", "." ]
[ 10, 10, 10, 10, 10, 2, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 1, 10, 10 ]
896
[ "Design", "In", "the", "manifest", ",", "the", "malware", "requests", "a", "large", "number", "of", "permissions", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
897
[ "However", ",", "it", "does", "n't", "request", "permissions", "like", "BIND_ADMIN", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
898
[ "To", "perform", "some", "of", "its", "activities", ",", "the", "malware", "does", "not", "need", "high", "privileges", "inside", "the", "device", ",", "as", "we", "will", "explain", "ahead", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]
899
[ "Permissions", "in", "the", "manifest", "This", "malware", "is", "designed", "to", "avoid", "detection", "and", "analysis", "." ]
[ 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10 ]