Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/15/2013
07:16 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Microsoft Discovers Trojan That Erases Evidence Of Its Existence

This downloader is also the payload

Researchers at Microsoft have spotted a Trojan downloader that does something very savvy yet rare: It deletes its own components so researchers and forensics investigators can't analyze or identify it.

The so-called Win32/Nemim.gen!A Trojan is also unusual in that unlike most Trojan downloaders that are put in place to deliver the real payload, this Trojan is also the payload, according to Jonathan San Jose, a member of Microsoft's Malware Protection Center.

But the researchers lucked out and found some pieces of the malware. "Most URLs that this trojan attempts to connect to for downloading are currently unavailable, but we got lucky and were able to find some of its components to investigate further," San Jose wrote in a blog post.

Nemim.gen's ability to delete its components can wreak havoc for forensics investigators and malware hunters. "This prevents the files from being isolated and analysed. Thus, during analysis of the downloader, we may not easily find any downloaded component files on the system; even when using file recovery tools, we may see somewhat suspicious deleted file names but we may be unable to recover the correct content of the file," San Jose said.

Malware increasingly is becoming mores sophisticated, and the more advanced attackers are employing techniques to fly under the radar.

[Zero-day and rapidly morphing malware is proliferating across the Web. Is your enterprise ready to stop it? See Malware: The Next Generation.]

Jaime Blasco, labs manager at Alien Vault Labs, says he's seeing more malware with built-in anti-forensics features as well as the ability to deter investigators.

"In the case of Nemin, it is a clever idea since the analysts won't be able to determine the origin of the infection, and the infrastructure used to infect the systems will remain undiscovered for a longer period," he says. "In addition, most of the security companies rely on automatic environments that execute and emulate malicious programs. We have seen how more and more malware families are beginning to add capabilities to detect these environments and deter emulation. We have also seen some malware samples that only get activated if they detect human clicking activity on the system."

Microsoft found two components of the Trojan that it downloads and runs, including a file infector and a password-stealer. The file infector -- which Microsoft identified as Virus:Win32/Nemim.gen!A -- tries to infect executable files in removable drives. The password-stealer -- PWS:Win32/Nemim.A -- targets user credentials in email accounts, Windows Messenger/Live Messenger, Gmail Notifier, Google Desktop, and Google Talk.

The Trojan sometimes appears as part of a display graphics driver in order to camouflage itself, typically as a file called igfxext.exe, according to Microsoft.

"If you're infected with TrojanDownloader:Win32/Nemim.gen!A, we recommend you change all account passwords after you've cleaned your system, as it's likely you've also encountered PWS:Win32/Nemim.A," the password-stealer, San Jose said.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
lsatenstein
50%
50%
lsatenstein,
User Rank: Apprentice
4/19/2013 | 1:20:26 PM
re: Microsoft Discovers Trojan That Erases Evidence Of Its Existence
I use linux, and linux does not execute exe files. Furthermore, to be able to execute, it takes an administrator (root) password to change the properties of a file to permit execution.
Finally, we have Selinux, which maintains a permissions database.- The permissions database indicates what every executable on the system is allowed / not allowed to do.,

So, do as I have done and switch away from Microsoft Operating System(s)
Dracen
50%
50%
Dracen,
User Rank: Apprentice
5/4/2013 | 1:31:25 AM
re: Microsoft Discovers Trojan That Erases Evidence Of Its Existence
I would love to do that if I didn't have to use Microsoft Word for homework :P
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19750
PUBLISHED: 2019-12-12
minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
CVE-2019-4606
PUBLISHED: 2019-12-12
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.