Malware News Top 5: Things to know about fileless attacks

cruelsister

Level 42
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 13, 2013
3,148
Good to know since much of this discussion is above my pay grade & I use CF

Yeah, CF pretty much will just blow stuff like this away on initial run, no matter what the initial vector (it can be something like an exploit from a website, an actual malware payload, or (my Favorite) coding in the malware into a legitimate application (not that I would know anything about this, being Kind and Gentle).

However if one installs CF on a compromised system, one MUST initially place the fireWall on the "Custom Ruleset" Mode. This will block the OutBound transmission constantly.

2018-04-29 14_58_11-w7anew test (Snapshot 5) [Running] - Oracle VM VirtualBox.png

(the above is when you install CF on and infected system. Think Windows Firewall would have given you a peep?) The cool thing about this sort of malware is that one can time the activation- You can specify it runs once a month, once a week, or like in the malware that I used for the above screenshot was re-coded to Activate every 15 seconds. The Monthly activation is a real Pain for analysis, as one sees many times that an actual infected file is marked as clean due to the Sleep function).

Anyway, malware like this has been out for a number of years (initially coded by our Friends living in the Steppes of Central Asia) and is problematic for many reasons. The way to stop this crap is actually quite intuitive- either stop the initial vector (not likely for a true zero-day), stop the OutBound transmission, or look into the place where the persistence (ie- starting with each System start) mechanism was put in place (normally WMI Root).

This is actually an issue for a number of Security Applications- of the major Second Opinion Scanners (MB, HMP, EEK, Norton PE) only HMP detects and stops the Persistence (Fun Fact- although many seem to feel that if a 2nd opinion scanner finds no malware extent that the system is clean. Actually a "Clean" report just means that it has not found all of the things it was programmed to find, and God alone knows about anything else). Of the major AV's, things like Avira, Avast/AVG/FortiClient are Oblivious to it. Kaspersky will detect it, but that may be because (LIBEL ALERT!!!!!) they initially coded it.



Andy- I don't know if I would steer anyone trying to learn to go to Wilders. They seem to have preconceived notions and cannot be dissuaded from them. They will discuss if the latest portable build of CCleaner is legit until the Cows come Home, but when confronted by information that things like MB, HMP. EAM (their favs) are totally ineffective for worms- not a peep...
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,142
@cruelsister & @Opcode
I think that posts on both forums should be considered as a starting point, because members' opinions are so different, even when reading a single thread. But, many posts include links to interesting source articles and there are some very interesting threads (some from 10 years ago) on both forums. I think that it is better to read MalwareTips & Wilderssecurity than only MalwareTips.
I usually do not rely on members' posts/opinions (with some exceptions) but rather on sources, so I do not know which forum would be better for most users.
But, I also like that both of you post most on MalwareTips forum.:)(y)
 
Last edited:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,142
Wilders Security is for people who want overkill security configs while fantasizing about becoming James Bond.
I agree, but many MalwareTips members are only one step behind them.:)
That is normal. After many experiments and some learning, most of them will settle eventually for something simple and efficient.
 
Last edited:

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top