Jump to content

Fareit Malware Uses Different File Hash for Each Attack to Avoid AV Detection


Batu69

Recommended Posts

Malware uses different file hashes, but the same file names



In their attempts to hide from antivirus engines, hackers have altered the Fareit info stealer and malware downloading trojan to use a different file hash with every new infection, as Cisco's Talos team reports.



Fareit, a trojan specialized in breaching user computers, talking to a C&C (command-and-control) server, and then downloading nasty malware on their systems, has been around since 2012. While in the beginning it was a benign malware downloader, over time it has evolved into a talented information stealer, that's mainly specialized in extracting passwords from Web browsers.



We saw it stealing data from Fargo clients in 2013, and even earlier this year, when criminals were changing DNS entries to point unsuspecting users to servers where Fareit was hosted.



Fareit hides behind chameleon-like tactics



This time around, Cisco's Talos security team has stumbled upon a new version of this malware family that behaves like a chameleon, changing its file hash with each infection, even if the file name remains the same.



The first samples were seen in July of this year, and the malware's creators opted for this tactic to avoid hash- and signature-based detection methods.



"One possible reason for this might be, that the mechanism which they use to download additional malware files or modules (e.g. cclub02.exe), need fixed names or paths (like http://IP/cclub02.exe)and is not flexible enough to handle on-the-fly generated file names on a per victim/campaign base," explains the Talos Group's Earl Carter & Holger Unterbrink. "This could also indicate a pay-per-infection botnet, but of course, this is speculation until we reverse engineer the local binaries and analyze the server command and control software."



Around 2,500 Fareit samples detected, leading back to 2 IP addresses



Cisco's security products recorded 2,455 Fareit samples, but only 23 of them shared the same hash. Digging deeper into the data, they've also noticed that all these samples communicated with only 2 C&C servers, hosted at 89.144.2.115 and 89.144.2.119.



For most of the detected Fareit samples detection was low in VirusTotal, most of the binary files infected with the malware getting an average score of 4/56.



There was, though, one malware sample that got a score of 40/54, but that sample had been detected at the start of March 2015.



The evidence points that this campaign is run by the same group, and despite the cyber-criminals' effort to use different file hashes, Cisco's team says that a simple string match against the static file names should protect users from further infections.



Source


Link to comment
Share on other sites


  • Replies 9
  • Views 1.4k
  • Created
  • Last Reply

I was going to say different file hash everytime to avoid detection didnt workk as intended as cisco's talos team got a sample of it.

Link to comment
Share on other sites


Lol! File hash :) only if you use ClaimAV, which is hash based, the writer of this article don't know that antivirus now use signature, and polymorphic chechking mechanism to identify malwares and viruses.

Hashes that was back in the ninties !! :)

Link to comment
Share on other sites


Hashes are used today. Hashes in the nineties is MDfive sh-0 sha-1. The hashes sha-twohundredfiftysix and sha-fivehundredtwelve is not the nineties.

Link to comment
Share on other sites


For your information its not claimav its ClamAV and its the only open source antivirus there is and its command line based there is a gui version clanwin. Its not a antivirus nobody knows about as its used in virustotal.

Link to comment
Share on other sites


I4rg£8all8ag

You guys Must work for Symantec or Kasperkey or someone like that because you are very cleaver

Link to comment
Share on other sites


For your information its not claimav its ClamAV and its the only open source antivirus there is and its command line based there is a gui version clanwin. Its not a antivirus nobody knows about as its used in virustotal.

ClamAV is the only working antivirus for Linux .. Comodo has made one but its very buggy and no one seems to can get it working. Its not like you really need and Antivirus on Linux no ways because windows malware don't effect Linux. Only if you run a Linux server maybe you need one to prevent the spread of windows malware to other windows users. That's one of the benefits of having a low market share most malware is written for Windows and Mac and when one does popup for Linux it can be patched very fast.in updates ;)

Link to comment
Share on other sites


Hashes are used today. Hashes in the nineties is MDfive sh-0 sha-1. The hashes sha-twohundredfiftysix and sha-fivehundredtwelve is not the nineties.

Homey, I meant checking hashes, not when new hashes are deployed, I guess news website can reformulate anything to drive traffic and convert it into cash, money, honey!

Link to comment
Share on other sites


  • Administrator

This surely raises a question about which, when, how and why does an AV only check a file's hash. Hash checking can be helpful in whitelisting good files, but letting a file go just because it's hash does not appear in the blacklists is idiotic. I do not think any AV does this.

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...