|
Tweet Follow @spamhaus |
|
|||
![]() Poor sending practices trigger a tidal wave of informational listings Spamhaus Botnet Threat Update: Q4-2021 SERVICE UPDATE | Spamhaus DNSBL users who query via Cloudflare DNS need to make changes to email set-up Spamhaus Botnet Threat Update: Q3-2021 Spammer Abuse of Free Google Services Spamhaus Botnet Threat Update: Q2-2021 Emotet Email Aftermath Wordpress compromises: What's beyond the URL? Older News Articles: ![]() ![]() |
Spamhaus Malware Labs - Spamhaus's malware research unit - recently observed a wave of new PandaZeuS malware samples being distributed during the Christmas season. PandaZeuS, also known as Panda Banker, is an ebanking Trojan that evolved from the notorious ZeuS trojan and is being used by different threat actors to compromise ebanking credentials, used by cybercriminals to commit ebanking fraud. Looking into two recent PandaZeuS campaigns that have just been spread before Christmas revealed that the most recent version of PandaZeuS comes with a few minor changes. An important one is the change in the encryption scheme of PandaZeuS’s Base Config. While PandaZeuS is still using the RC4 binary encryption scheme, it comes with some tiny modifications. First of all, the versioning of PandaZeuS got updated to 2.6.1: ![]() New version 2.6.1 In the previous version, the base config was AES-265-CBC and RC4 encrypted . While this is still the case of the most recent version of PandaZeuS too, a slight modification in RC4 has been done: ![]() PandaZeuS code snipped The screenshot above documented the changes made to by the developers of PandaZeuS to the code:
This can be represented in Python code as:
While we can only speculate about the reason of this minor change in the encryption scheme of PandaZeuS, we suspect the intent behind this code change is to break malware extractors used by malware researchers to extract botnet controllers from PandaZeuS malware samples. Looking into sinkhole data of one of these PandaZeuS campaigns shows that the botnet is mainly targeting English-speaking internet users: ![]() In addition, the associated botnet domain names are poorly detected: Indicators of Compromise (IOC)Campaign #1 PandaZeuS botnet controller URLs: hxxps://922B031AAC47.tk/2egublocatolaubhaqiec.dat
PandaZeuS botnet controller domain names (blocked by Spamhaus RPZ):
262D65FC7F10.ga
PandaZeuS botnet controllers (blocked by Spamhaus BCL): 89.18.27.155
Related malware samples (MD5): 0d1150d89f94701b54c7feb81d83a8fd
Campaign #2 PandaZeuS botnet controller URLs: hxxps://gromnes.top/1iqrozoymydfykiabloyx.dat
PandaZeuS botnet controller domain names (blocked by Spamhaus RPZ): aklexim.top
PandaZeuS botnet controllers (blocked by Spamhaus BCL): 27.102.67.144
Related malware samples (MD5): 02ac00fe985091b78eaeb64ee697d57f
Related Spamhaus Products
Spamhaus Malware Labs is Spamhaus's malware research unit run in conjunction with Deteque, a subsidiary of Spamhaus Technology Ltd. |
![]() ![]() ![]() ![]() ![]() ![]() |
![]() Permanent link to this news article: PandaZeuS’s Christmas Gift: Change in the Encryption scheme http://www.spamhaus.org/news/article/771/pandazeuss-christmas-gift-change-in-the-encryption-scheme ![]() |
![]() Permission to quote from or reproduce Spamhaus News articles is granted automatically providing you state the source as Spamhaus and link to the news record. |
|