Author Topic: Possibly Undetected Zlader.B  (Read 3232 times)

0 Members and 1 Guest are viewing this topic.

Offline KDibble

  • Sr. Member
  • ****
  • Posts: 229
Possibly Undetected Zlader.B
« on: September 08, 2016, 06:04:49 PM »
Using Avast EndPoint Protection 8.x with the SOA
The affected workstation is running Windows 7 Ultimate SP1
VPS: 160524-1
Program: 8.0.1607
SOA: 1.3.3.35, running on Windows 7 Ultimate SP1

It seems to me that Avast may not be detecting, or at least, not fully detecting and blocking, a recent variant of what Trend Micro calls "Worm_Zlader.B":

http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_zlader.b

I have no definitive proof; I will just present the evidence I have collected.

Yesterday shortly before noon, users on my network began reporting that the names of all of the top-level folders inside a couple of network shares had been renamed to series of numbers and letters inside curly braces.

Further investigation revealed that these new names resembled standard Windows resource GUIDs, and that bogus "recycler" folders had also been created in each of the affected shares. Also, new "shortcuts" had been created that were given the real names of each of the renamed folders in the shares. These shortcuts actually pointed to a GUID-named .scr file that was deposited in the bogus "recycler" folder.

The renamed folders can easily be renamed back to what they should be, and none of the subfolders or files inside them were affected.

These shares are on a Linux file server running SAMBA 3. Therefore, and fortunately, double-clicking these shortcuts produced no effect, because Windows software cannot execute on those shares.

This is the behavior that has been documented for Worm_Zlader.B.

The bogus "recycler" folders and the .scr files they contain show creation dates in Windows in February of this year. However, examining them in a GUI file manager on the Linux machine shows that they were actually created yesterday.

On the Security tab of the Windows Properties dialog, all of the shortcuts and bogus "recycler" folders, and the files they contained, showed "Full Control" permissions granted to the same single network domain user name. This user has access to only one workstation on the network. This is a restricted domain user account; it does not have permissions to install software on any machine. However, all network users have the ability to create or modify folders on the network shares to which they have access.

The dropped files referenced on the Trend Micro site were not found on this user's computer.

An Avast full scan of this computer found no threats. Also, an Avast scan of one of the bogus recycler folders on the network share did not find anything wrong with it or its contents.

A Trend Micro Housecall full scan of this computer found no threats.

At around the same time of day yesterday, the SOA recorded that the Avast Web Shield found the following on this user's computer:

http://lidiahalamtrading.com/pm.dll  Sf:Nuclear-A [Trj]

Visiting that site in Firefox (just the site; I did not dare to try to navigate directly to the dll file) does not produce an Avast pop-up warning. A Google search on the site reports that the site "may have been hacked". To my eyes, the site appears to have been abandoned.

Oddly, the Web Shield also reported the identical site and malware on a different workstation on the network about five minutes earlier. The user who created the bogus shortcuts does not have access to this second computer, and the user of the second computer was not implicated in any of the issues we found.

However, the behavior we saw on our network shares has not been attributed to Sf:Nuclear-A as far as I can tell.

About 3 weeks earlier, one of our email addresses (hosted by Rackspace, not us) was hacked by a botnet and used to send spam. The bots mostly used that address as the "from" address, however, it also spoofed another of our addresses as well. The user implicated in the current folder-name-changing incident was one of a very small number of users who has access to both of those email addresses.

I can't rule out that this user encountered a similar issue to the "lidiatrading" event while browsing a few weeks earlier, at a time when Avast may not have been detecting that issue. On the other hand, the user also has an extensive browser history of visiting inappropriate websites so her behavior may have simply exposed us to two unrelated threats.

Possibly related to this, a full MalwareBytes scan on this user's machine found:

Spyware.Ursnif

Trend Micro has this to say about that malware:

http://blog.trendmicro.com/trendlabs-security-intelligence/ursnif-the-multifaceted-malware/

The behavior we saw is not associated with that malware as far as I know, but it is the ONLY malware that ANY scan actually found on the machine of the user whose login was associated with the bogus shortcuts and recycler folders.

I am very concerned about this. I don't know what those .scr executables would have done to my network if they had been executed on a Windows server instead of being on a Linux machine. It is not clear that the website flagged by Avast had anything to do with this event, but if it did, Avast failed to block its action. This strikes me as highly dangerous.

I will probably submit this report and the .scr file directly to Avast but wanted your reactions first.

Thanks.
« Last Edit: September 08, 2016, 06:08:00 PM by KDibble »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: Possibly Undetected Zlader.B
« Reply #1 on: September 08, 2016, 06:22:56 PM »
upload and test any file(s) you have at virustotal.com / metadefender.com / jotti.org


http://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm_zlader.b
Quote
Infection Channel:

Propagates via flashdrives, Downloaded from the Internet, Dropped by other malware

This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It modifies the Internet Explorer Zone Settings.

It connects to certain websites to send and receive information. It deletes itself after execution.

Install MCShield  >  http://mcshield.net


Offline KDibble

  • Sr. Member
  • ****
  • Posts: 229
Re: Possibly Undetected Zlader.B
« Reply #2 on: September 08, 2016, 07:26:31 PM »
UPDATE:

A specific scan on the .scr file does result in detection of Win32:Malware-gen by Avast. However, scanning the bogus "recycler" folder that contains that file does not detect any threats. That's not good.

Virus Total identifies it as Trend Micro's Zlader among other things.

https://www.virustotal.com/en/file/2cbde0d45f084008236b4bae4ee460427c5c69521f12f023118a956fdd5997d7/analysis/

MetaDefender and Jotti both reported that their Trend Micro scans didn't detect anything. So I don't know what these sites are actually doing.

It's possible that it was transmitted by a USB drive but the information on Zlader also says it can come from a website. In either case, some process must have executed in memory on the user's machine, and Avast did not detect or block it. That's what I'm concerned about.
« Last Edit: September 08, 2016, 07:39:51 PM by KDibble »

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: Possibly Undetected Zlader.B
« Reply #3 on: September 08, 2016, 07:49:27 PM »
Analysis date:   2016-09-07 20:36:41 UTC ( 21 hours, 10 minutes ago )

Not a fresh scan ... when scanned before, always click rescan for a fresh result

The engine at metadefender / jotti may not recived the update signature for it yet or was it a old scan ?

« Last Edit: September 08, 2016, 08:39:33 PM by Pondus »

Offline KDibble

  • Sr. Member
  • ****
  • Posts: 229
Re: Possibly Undetected Zlader.B
« Reply #4 on: September 09, 2016, 09:23:03 PM »
I've started a ticket on this. Thanks for your help.

Offline KDibble

  • Sr. Member
  • ****
  • Posts: 229
Re: Possibly Undetected Zlader.B
« Reply #5 on: September 30, 2016, 03:46:59 PM »
RESOLUTION: Avast processed my ticket and reported that the offending .scr file was mistakenly categorized by Avast as PUP instead of malware. The file is now identified as Win32:Dropper-gen.

Thanks to Avast, and to those who helped here.


Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33897
  • malware fighter
Re: Possibly Undetected Zlader.B
« Reply #6 on: September 30, 2016, 05:25:20 PM »
IDS alert here confirms it is macro malware, see: http://urlquery.net/report.php?id=1475247329027
With other alerts and also malware-debugging reported here: http://urlquery.net/report.php?id=1473268156412

Flagged: https://www.virustotal.com/pl/url/ef4d13662f26c5c500063721a4b52dc416f45b254b6152c6143e9ff8c59a69f3/analysis/1475248362/

Detected: https://www.threatcrowd.org/malware.php?md5=ca7933c9ceb85ccd8d4c92afc8c3d6be
Antivirus   [Macro.Trojan.Dropperd.Auto]
[Trojan:W97M/Nastjencro.A]
[W2KM_DLOADR.YYSSE]
[W97M/Downloader.bml]
[W97M/Dropper.ck]
Where now avast added: Win32:Dropper-gen.

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!