New RAT Shows 'Snake' Campaign Still Active

New RAT Shows 'Snake' Campaign Still Active: Researchers....
After analyzing the new threat, which they have dubbed "ComRAT,"
In version 3.26, the author changed the key and remove the known file name
This action can be an indication for the developer’s effort to hide this connection
ComRAT is more complex and cleverer. The malware is loaded into each and every process of the infected machine and the main part (payload) of the malware is only executed in explorer.exe. Furthermore, the C&C communication
blends into the usual browser traffic and the malware communicates to the browser by named pipe. It is by far a more complex userland design than Agent.BTZ.
MD5:
0ae421691579ff6b27f65f49e79e88f6    (dropper v3.26)
255118ac14a9e66124f7110acd16f2cd    (lib1 v3.26)
b407b6e5b4046da226d6e189a67f62ca    (lib2, v3.26)
8ebf7f768d7214f99905c99b6f8242dc    (dropper, unknown version)
9d481769de63789d571805009cbf709a    (dropper, unknown version)
83a48760e92bf30961b4a943d3095b0a    (lib 64-Bit, unknown version)
ea23d67e41d1f0a7f7e7a8b59e7cb60f    (lib 64-Bit; unknown version)
Command and control
weather-online.hopto.org
webonline.mefound.com
sportacademy.my03.com
easport-news.publicvm.com
new-book.linkpc.net
Questions :
We have analyzed all the MD5 values, but Microsoft FEP doesn’t have signature to Detect this Variant(but other AV vendors have detected this Variant).
So we need to know, when Microsoft will come with updated signature to detect this new variant??
Sample :
https://www.virustotal.com/en-gb/file/a89f27758bb6e207477f92527b2174090012e2ac23dfc44cdf6effd539c15ada/analysis/
Complete report of this malware below :
https://blog.gdatasoftware.com/blog/article/the-uroburos-case-new-sophisticated-rat-identified.html.

I checked the address of virustotal and it indicated that Microsoft will detect it as
Backdoor:Win32/Turla.Q , when look into details of this malware in Microsoft Malware Protection Center:
http://www.microsoft.com/security/portal/threat/encyclopedia/entry.aspx?Name=Backdoor%3aWin32%2fTurla.Q
It is known from Nov 13, 2014 and later on. So FEP should be able to detect it.
However, if you still believe there is a sample of this malware or any other malware which won't detect by FEP or any other Microsoft Anti-Malware products, you could submit sample to Microsoft Malware Protection Center:
https://www.microsoft.com/security/portal/submission/submit.aspx
       

Similar Messages

Maybe you are looking for

  • Transfer of AUC from one fund to another fund

    We are a governmental entity.  We have assets under construction.  Our Board just approved the official closing of a fund that had AUC.  The AUC needs to be transferred to another fund.   We attempted posting a journal entry where we credited against

  • TimeZone: how to get real/full name?

    The to String method of TimeZone returns something like this: timeZone: sun.util.calendar.ZoneInfo[id="America/Porto_Acre",offset=-18000000,dstSavings=0,useDaylight=false,transitions=31,lastRule=null] timeZone: sun.util.calendar.ZoneInfo[id="America/

  • Segmentation filter without description in PC_UI

    Hello. When I am creating a filter in my segment builder in SAP GUI for attributes of BW infoset data sources, the system displays me the code and the description of the attribute. But if I am trying to do the same in PC-UI I just can see the code of

  • Ipad says connect to iTunes

    Hi, I had an ipad i turned on to use, and battery didnt have much juice left in it, then it rebooted. Shows Apple Logo, then the spinning circle and shuts down, and stuck in that loop. Plugged it into Itunes on PC in DFU mode and it said recovery mod

  • Bridge CS3 Loupe tool in Lightroom

    I would love to have the loupe tool present in Bridge CS3 in Lightroom in addition to the current zoom view. I found the Loupe in Bridge excellent for a quick check on the focus of certain part of the picture. I also like very much the view type 3 in