Found another Remote Access Trojan pretending to be Documentation on Covid19 Response and Preparedness

By

As the Corona virus pandemic unfolds, the Sonicwall Capture labs  Research team also observe an increasing amount of malicious software actively exploiting this crisis. As we have previously reported, we have seen different malware families using this tactic from ransomware, to infostealers, to phishing scam trying to scheme people who are in constant search for news and updates from around the world.

This week, we have seen a malware family pretending to be information regarding the virus and targeting administrators of institutions for higher education.

Infection Cycle

The Trojan arrives in an archive possibly distributed via spam. Within that archive is a file with the following filename and icon:

  • Interim Guidance for Administrators of US Institutions of Higher Education to Plan, Prepare and Respond to CoViD19.exe

 

In fact the official statement from CDC (Centers for Disease Control and Prevention) concerning the above can be found on this official webpage which has the same title.

Upon execution it creates a copy of itself in the following directory:

  • %Appdata%\Roaming\shost.exe

To ensure persistence it adds the following to the registry:

  • HKCU/Software\Microsoft\Windows\CurrentVersion\Run  shost   %Appdata%\Roaming\shost.exe

It then makes a DNS query to peacelist [dot] ignorelist[dot]com:

And then makes periodic connections to a remote server using ports 5505, 7707, 8808.

At the time of analysis, no data has been exchanged, received nor sent. But certainly this demonstrated its ability to phone home and possibly receive further instructions from the remote server.

During this crisis, we urge our users to only use official and reputable websites as their source of information and news. Always be vigilant and cautious when installing software programs particularly if you are not certain of the source.

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: Async.RAT (Trojan)

This threat is also detected by SonicWALL Capture ATP w/RTDMI and the Capture Client endpoint solutions

 

 

 

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.