Welcome to Cisco Talos' weekly Threat Roundup, where we go over some of the most prevalent malware and vulnerabilities we've seen over the past week. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

As a reminder, the information provided for the following threats in this post is non-exhaustive and current as of the date of publication. Detection and coverage for the following threats is subject to updates, pending additional threat or vulnerability analysis. For the most current information, please refer to your Firepower Management Center, Snort.org, or ClamAV.net.


The most prevalent threats highlighted in this round up are:

  • Win.Dropper.Snojan-6553195-0
    Dropper
    Snojan is a downloader that is used to drop and execute additional malware.
  • Win.Dropper.Fareit-6544485-0
    Dropper
    Fareit is malware designed to steal sensitive information like stored login information. You can read more about it on our blog https://blog.talosintelligence.com/2015/09/down-rabbit-hole-botnet-analysis-for.html.
  • Win.Dropper.Icloader-6553203-0
    Dropper
    Icloader is a dropper that can install malicious or potentially unwanted applications.
  • Win.Dropper.Zbot-6553346-0
    Dropper
    Zbot (AKA Zeus bot) is info stealing malware targeting users banking credentials. You can read more on our blog https://talosintelligence.com/zeus_trojan.

THREATS

Win.Dropper.Snojan-6553195-0


INDICATORS OF COMPROMISE


Registry Keys

  • <HKCU>\SOFTWARE\DOWNLOADER
  • Value: quarantine
  • <HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\CF30E3D3DF78F487C056A09D220EA29EE17F1478304146F1395DCD4273DB6DEB.EXE
  • Value: LastDetectionTime
  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
  • Value: PnpInstanceID
  • <HKCU>\Software\Downloader
  • <HKLM>\Software\Microsoft\RADAR\HeapLeakDetection\Settings\LeakDiagnosisAttempted
  • <HKLM>\SOFTWARE\CLASSES
  • <HKLM>\SOFTWARE\MICROSOFT\RADAR\HEAPLEAKDETECTION\DIAGNOSEDAPPLICATIONS\cf30e3d3df78f487c056a09d220ea29ee17f1478304146f1395dcd4273db6deb.exe
  • <HKU>\Software\Downloader

Mutexes

  • N/A

IP Addresses

  • 104[.]28[.]21[.]191
  • 104[.]28[.]20[.]191

Domain Names

  • reason0monster-meadow[.]tk

Files and or directories created

  • %LocalAppData%\Temp\Downloader
  • %LocalAppData%\Temp\Downloader\tempicon.ico

File Hashes

  • cf30e3d3df78f487c056a09d220ea29ee17f1478304146f1395dcd4273db6deb
  • ad71f36a2cfdd5cd113a12009ef4e56e21fe028ac449841ab2effa87292292ec
  • 8c28892b44b95c2f04ceedb0be68e8fdaa6eb444b2f1fd9f1db5eed9be8a4147
  • 5761e20e73dadf7be05f7fafcb40d9b816885c8331fc69448eab3965ac8ae940
  • c6739a0e1151cb69ab43089901da6c5f1b932dc41048d02e4bd242b0e38e91fc
  • 422851acbc75b521896e06a5158e32d94a0a652212843fd87a00d88bc47dc52a
  • 3e7df4da29ac871c46a77e4bbc4dc1c080f73370a7db820cd6fc87884db7bf89
  • 80382158e2bb303c7e046d5144fa0f49d3c525f84fde81f4bb9fbb8e162927f5
  • 5a6a4807e91e3a706999d60a44cadd362f89ec94ff19088b24aad9239c676f78
  • cec042b98f1ca6d223a4a3ce911098493ef656c7f628e0404325b5f143fd26b8
  • 5c712a999755291a8cd0204a2e18cf876117e10074d89c8ba1f4fbafaf4fcaf0
  • e4b12046b82cdf5a6d30f08b11134e3e1caf321fabd2424f2c3873041eb1c1b0
  • 5a74303325990d5beb7f46f91429a6178fb1fbb0daf64e82d72906608b8a1e90


COVERAGE


SCREENSHOTS OF DETECTION

AMP



ThreatGrid








Win.Dropper.Fareit-6544485-0


INDICATORS OF COMPROMISE


Registry Keys

  • N/A

Mutexes

  • N/A

IP Addresses

  • N/A

Domain Names

  • N/A

Files and or directories created

  • N/A

File Hashes

  • 2e7d24541da31ab5a130cf7df030e1c3d2ee31241713cd2a55733ac2557888fb
  • c98038f1367e8fced0f902e73ea97dfe07d6b2863ce5fad439e87f3a75eee2d2
  • 90c33b025fea52ec12cab793625eccf08fc55e544976d8aeed82c883c78ea8d6
  • db88e8ce7f0015c132e1a5924c0d51888b3c7edad698d7dd99a62408dded21d4
  • 77f546ee92e7466eb3950374e5afad7af73daed911af1c17482b6ab0abb44500
  • 38fa0b6386e446ee7e1678f3a883bdc93681d5038da66486cfea4a2d9d9c4fc0
  • 1b6d23ded662ec5bfb5d34904fda6f337be2069557dddc139e69d48672bf5c96
  • 1f3f15ea6539c98148ef586de273b29d698986317354f2312e2dba6c4c5c5cbb
  • 87cd1118be63b7fc999c715f5a54877b72db273cff33d95427518a489959a755
  • c7f53968de7b8c7c0f8311c9df55717844afe6f63a8e4ab7f0fddc6b31c5aa7e
  • a9ae093f49608d3220681a69f8873156369f86a4b5dbb135a5ed295dfb01a6df
  • 3c2c7e48c16c4f9ba5238d397243f0aac758a37feea57f08ae0df78a957324da
  • b666016a21c083b8e528f8175ae2d6417ba2ec3e5dc2a6336e29e52efe960a89
  • aed6353688be80e822dd4d9c214d939632fe0db9930a3149b7bc865c9daa5b01
  • b5eee79eb0cddb48fedce82ed4ae4ba364b995a97c536d528c739b01d7503eb4
  • bb8213867ea8ba9a16071d4e4f817fdf66f70e2a18a7fea1791efa885701ba87
  • 27d159cc11b0eab97c37e8cde3c13cd2d7e9720e7ffa41a7e8451d08c8e9da0a
  • 47f7b3ccdc0a8a91da054181d31a15f756762608e577750bd4c90c892fd47768


COVERAGE


SCREENSHOTS OF DETECTION

AMP



ThreatGrid








Win.Dropper.Icloader-6553203-0


INDICATORS OF COMPROMISE


Registry Keys

  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
  • Value: SavedLegacySettings
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\CONNECTIONS
  • Value: DefaultConnectionSettings
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\HISTORY
  • Value: CachePrefix
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: UNCAsIntranet
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: AutoDetect
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: ProxyBypass
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: IntranetName
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS
  • Value: DhcpDomain
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS
  • Value: DhcpNameServer
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS\INTERFACES\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpDefaultGateway
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS\INTERFACES\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpDomain
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS\INTERFACES\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpNameServer
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS\INTERFACES\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpSubnetMaskOpt
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\TCPIP\PARAMETERS\INTERFACES\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpInterfaceOptions
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NETBT\PARAMETERS\INTERFACES\TCPIP_{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpNetbiosOptions
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NETBT\PARAMETERS\INTERFACES\TCPIP_{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}
  • Value: DhcpNameServerList
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\NETBT\PARAMETERS
  • Value: DhcpScopeID
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\COOKIES
  • Value: CachePrefix
  • <HKLM>\SYSTEM\CONTROLSET001\SERVICES\MPSSVC\PARAMETERS\PORTKEYWORDS\DHCP
  • Value: Collection
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\5.0\CACHE\CONTENT
  • Value: CachePrefix
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
  • Value: ProxyServer
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
  • Value: AutoDetect
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
  • Value: ProxyOverride
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
  • Value: ProxyEnable
  • <HKCU>\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
  • Value: AutoConfigURL
  • <HKU>\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: ProxyBypass
  • <HKLM>\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS\ZONEMAP
  • Value: IntranetName
  • <HKLM>\SYSTEM\CONTROLSET001\CONTROL\NETWORK\{4D36E972-E325-11CE-BFC1-08002BE10318}\{9EB90D23-C5F9-4104-85A8-47DD7F6C4070}\CONNECTION
  • Value: PnpInstanceID
  • <HKCU>\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
  • <HKLM>\SOFTWARE\CLASSES

Mutexes

  • N/A

IP Addresses

  • 188[.]42[.]242[.]245
  • 35[.]158[.]168[.]189
  • 1[.]1[.]1[.]1

Domain Names

  • ec2-35-158-168-189[.]eu-central-1[.]compute[.]amazonaws[.]com

Files and or directories created

  • N/A

File Hashes

  • 0a5fe807dec1750e12787b96aa1fb5f8ddfc46f48d36af32049a2f1750ae9bff
  • 81102d69100b4ee91bd1247a22ed5959f2da57c2bcc064bdd531264284a8763e
  • 1e7bfdd44e0e8331ce3f03cb37b6ae8f30667a4ab0fc5fa7b417cc9feeb4a7f8
  • f573a18c7b57275b2737e62c5c0468acf688a9c2fad9a3c5b83d5209bc96cceb
  • c08e6b6708db6621a434275fa085516873cdd6ff39e818b741891b2377dfca2d
  • ef50d5e5dcc2a1ea6f546304b266b5c8960b0ee9c87305fc63c3cca26019d7d6
  • 800a0533147b774a1fd6940e948772ec20114ad4d2856ae1160dd09708695b38
  • a4f236efc26615e3ade5ff9c961d698b0aafc40b1b257a441dccd8ca060dfa90
  • 2f6f1cf599cef00e89b826b408f62d0949dc3dd8a1f6ef7b64a4d3368f7f0e6b
  • 554098adf01c6e799494a0415fff359bce2cf1543c23d7b46c464c9ec49982d6
  • ac1164f631b5ca03ee6e2dd39a492ca0b49c9d14a2ae4b2714e135ed48669dbf
  • 8054fdaa9d6c198ee592d03b236c3e78272f699e3149b288f8a1a4109a5aadd9
  • d721a98df1592e152d2a096ca936bbe776d76e013478ceebac99114b07330e89
  • 743375f8d3d42ed1fb2b02193e4366d718edd0b8b6b70ad0c69d937392bb82c9
  • 524c3716396d539e0ab0b4801fe784e81a32395a9ce0222cd4ab8348831c2a70
  • 44eeef3be66e7530c1201ade7a5e9e8ea15066bc91916173aa104d4576ce4b18
  • 94afc3856a03eab297025cfc6f5f3ed81cb81a925b745103b619d409baeb4b13
  • 9148c9000dfd4a1fe9a1fb64301c84eba312b578bc2c605ca1644169f8ab8916
  • 572fd355a7ee18c8c3b3f14f4864597038eb76beca81527128e4eeba0d630706
  • 54765436d9bfea2116fbff7a9069e4ca643f55eb5e722237cdd5d3a350e4b0ac
  • 7b4abf2b425c28e2130cb43022fb18ca52c545f28cd74fff09db9a6ff4082b56
  • 0698f016609e0c86abe57e6e5ebb547802d3ac77ac63714cfdbe0eb3c8eece03
  • e35d8a62870f2d1ab0fb56fe6e35fb50f980aa2dc83c01e8509b4fed170ee1b4
  • 7b7bce1098190011792b81b744fb21870fc99f3060882112a305b153d7140d4a
  • 2b0fb049cb28726bef4586260e67d28e627ddc5421691d0fd32cce9a487d35ce


COVERAGE


SCREENSHOTS OF DETECTION

AMP



ThreatGrid








Win.Dropper.Zbot-6553346-0


INDICATORS OF COMPROMISE


Registry Keys

  • N/A

Mutexes

  • N/A

IP Addresses

  • N/A

Domain Names

  • N/A

Files and or directories created

  • N/A

File Hashes

  • 723a41aee74c1dbda6649f6b4d97836d1eca0d5c82b36b3215abb0ee6559bf6a
  • 27a498db8bf71b58aa53acbe01e96d9c5823badf808dfe201a566ab2f510af10
  • fecd0ee9dde36132141660d0d6bdf70ae9c8de12f982a3eba3d187934553892a
  • b7fb44c2c32afad596829db9aee32e6e97710435b5e48b78a4dab12b22a723f1
  • e40b578a8122101de0df16884f1dfd08d1a1b49a47bf5c39ede5ece9573a03c9
  • 8e35333bc6db1fed6d63b0da78a84dbc422a5b403975ed5513b8eab4670dbbab
  • 340bd1ed4f96ca6f3877a57493fa647ff155045d28026d998e75a1225bdc5e62
  • b6b9c98e7b2f61ecb6710d8415d02db230732f6b7b972fcb41ebcebcde256b41
  • 47acb7051c8a0bc9c30f5691fae38750a25714d4fec10bcbcb2092559784fc30
  • fad370e039e311cb76ca9d100f77409f3145a000e1b951b54bfd08fa4df07828
  • ad0c94d8bb7fa915a87895ef17fb96446c045b4a4c78c0b67171752615ae48e6
  • 070308a72056f5eb6ed95cf22fe97a582bacf825e31c0f0a7826ece1b604186e
  • 17abdd1ae8ca74e061c6b3f2ef93c70a0278cf6fd272f186de43f6c3a605c61b
  • 5a6c010c9f54051c031aab95f1c9237553569d5d29638f163ef75b62ecf97e36
  • 75bec7ec1132adefb053663c654569d65874cf829ac4180748d7df2b7cb8bdb4
  • 18d8a4dd9fe6949724546b197809f9c0f9542f1dbc6aded5462b7e0aee35c7f8
  • 36a22ec97078427aff2fc35483a637e24188c371b8cfba6dac01377b06d634a7


COVERAGE


SCREENSHOTS OF DETECTION

AMP



ThreatGrid