Malware Trend Report, Q4 2014 October | November | December January 2015 Copyright RedSocks B.V. © 2014-2015. All Rights Reserved. Malware Trend Report Quarter 4, 2014 This page is left blank on purpose. Page 1 of 28 Malware Trend Report Quarter 4, 2014 Table of Contents 1. Introduction .............................................................................................................................................. 4 2. Summary .................................................................................................................................................. 5 2.1. Collecting Malware ............................................................................................................................. 6 2.2. Processing Malware ........................................................................................................................... 6 2.3. Detecting Malware ............................................................................................................................. 7 2.4. Classifying Malware ........................................................................................................................... 9 3. Trends ..................................................................................................................................................... 10 3.1. Adware ............................................................................................................................................. 10 3.2. Backdoors and Bots ...........................................................................................................................11 3.3. Exploits ............................................................................................................................................. 12 3.4. Rootkits .............................................................................................................................................13 3.5. Trojans ............................................................................................................................................. 15 3.6. Worms.............................................................................................................................................. 16 3.7. 64-bit Malware ..................................................................................................................................17 3.8. Malicious Others............................................................................................................................... 18 4. Geolocation ............................................................................................................................................ 20 5. Final Word ............................................................................................................................................... 23 5.1. Miscreants say "Je suis Charlie" too .................................................................................................. 23 Appendix A: Detecting Malware ................................................................................................................. 25 Appendix B: Classifying Malware ................................................................................................................ 26 Page 2 of 28 Malware Trend Report Quarter 4, 2014 Table of Figures Figure 1: Unique Malicious Files Q3-Q4 2014 ................................................................................................ 6 Figure 2: Space Need To Store New Malicious Files Q3-Q4 2014 .................................................................. 6 Figure 3: Detected vs. Not Detected October 2014 ....................................................................................... 7 Figure 4: Detected vs. Not Detected December 2014 ................................................................................... 8 Figure 5: Detected vs. Not Detected November 2014 ................................................................................... 8 Figure 6: Amount of Identified Adware Q4 ................................................................................................. 10 Figure 7: Distribution of Adware.Symmi.49537 Q4 ......................................................................................11 Figure 8: Amount of Identified Backdoors and Bots Q4 ...............................................................................11 Figure 9: Distribution of Backdoor.Bot.158614 Q4 ...................................................................................... 12 Figure 10: Amount of Identified Exploits Q4 ................................................................................................13 Figure 11: Amount of Identified Rootkits Q4 ............................................................................................... 14 Figure 12: Amount of Identified Trojans Q4 ................................................................................................ 15 Figure 13: Amount of Identified Worms Q3 ................................................................................................. 16 Figure 14: Amount of Identified 64-Bit Malware Q4 .....................................................................................17 Figure 15: 64-bit Malware Families Q4 ........................................................................................................ 18 Figure 16: Other Malware Q4 ...................................................................................................................... 18 Figure 17: Je Suis Charlie ............................................................................................................................. 24 Figure 18: Fake Movie Maker Message........................................................................................................ 24 Table of Tables Table 1: File Metrics Q3-Q4 ........................................................................................................................... 7 Table 2: Malware Categories Q4 ................................................................................................................... 9 Table 3: Top 3 Worm Families Q4 2014 ....................................................................................................... 16 Table 4: Other Malware Q4 vs. Q3 .............................................................................................................. 19 Table 5: Top 10 Countries Hosting C&C Servers Q3 ..................................................................................... 21 Table 6: Top 10 Countries Hosting C&C Servers Q4 .................................................................................... 21 Table 7: Malware Categories Q3 vs. Q4 ....................................................................................................... 23 Page 3 of 28 Malware Trend Report Quarter 4, 2014 1. Introduction This is the last quarterly trend report for 2014 from the RedSocks Malware Research Lab for 2014. RedSocks is a Dutch company specializing in malware detection. Our solution, RedSocks Malware Threat Defender, is a network appliance that analyses digital traffic flows in real-time, based on algorithms and lists of malicious indicators. This critical information is compiled by the RedSocks Malware Intelligence Team (RSMIT). The team consists of specialists whose job is to identify new threats and trends on the Internet and to translate them into state-of-the-art malware detection capabilities. With this report, we hope to provide the reader with a deeper insight into the trends we see in the malware we process as we look at data collected during the fourth quarter of 2014. At RedSocks we analyses large numbers of malicious files on a daily basis, therefore we can cover only a few topics briefly in this trend report. Protecting your data from Internet-based threats is not an easy task, and relying solely on protection from Anti-Virus companies - no matter how established their brand - is not enough. Comprehensive protection requires an entirely new approach. Page 4 of 28 Malware Trend Report Quarter 4, 2014 2. Summary The total number of new and unique malicious files processed per month went from 7.2 million in October to 8.2 million in November, and down to 7.8 million in December. The overall detection by Anti-Virus software this quarter was roughly 5 percent lower compared to the third quarter. The detection rate for October was 86.31 percent. For November, it is 83.98 percent and in December, the average detection was only 73.0 percent. This might not sound too bad, but it means that around 14 percent, 16 percent and 27 percent, respectively, were not detected. Please note that identification rates can change based on samples chosen and time scanned. During the fourth quarter, the number of identified adware went up from 1.2 million in October to 1.6 million in November only to drop to 1.5 million in December. During the third quarter the amount of identified backdoors and bots (B&B) increased from 117,000 to 140,000. In the last quarter of 2014, the B&B start in October with 119.000 unique samples, which increased to 136.000 in November and 142.000 in December. Only 0.03 percent of the files were detected by the Anti-Virus software as exploit and 0.04 percent as rootkit in October by Anti-Virus software. In November, 0.06 percent were detected as rootkits and 0.02 percent as exploits. For December it is 0.11 percent exploits and 0.06 percent rootkits. Like in the first, second, and third quarter of this year, trojans are by far the most popular type of malware. In October, they made up for 3 million, and in November and December, 3.6 million. In October, 471,000 worm files were identified. In November, the number increased to 622,000. In December, 674,000 worms were added to our databases. Grouped together, all other malicious files such as flooders, hacktools, spoofers, spyware, viruses, etc., make up for 34, 26 and 28 percent of the total for October, November and December, respectively. As in the third quarter, most Command & Control (C&C) servers were hosted in the United States, followed by the Russian Federation. Germany could be found on the third place, but lost it to the United Kingdom. The Netherlands, like in the third quarter, can be found at 5th. Page 5 of 28 Malware Trend Report Quarter 4, 2014 2.1. Collecting Malware At the RedSocks Malware Research Labs, we track large numbers of malware from our globally-distributed honeypots, honey-clients, spam-nets and various botnet monitoring sensors. Due to the distribution of our honeypots, we are able to automatically collect and process new malicious samples from across the globe. We also exchange large quantities of malicious files with the Anti-Virus industry. Figure 1: Unique Malicious Files Q3-Q4 2014 2.2. Processing Malware Working with malware is what we love to do. More than 200,000 new malicious files arrive every day at our automated malware collecting machines. Figure 2: Space Need To Store New Malicious Files Q3-Q4 2014 Page 6 of 28 Malware Trend Report Quarter 4, 2014 All samples were renamed according to their hash calculation. We then check to see if that particular piece of malware has already been processed. In figure 2, the total amount of disk space needed to store all the new malicious files in gigabytes. While the numbers of new malicious files stayed more or less the same, the average file size decreased a little bit. During the second quarter, we saw that malicious files, on average, shrunk 12.73 percent. During the third quarter, the average file size increased with 118.52 percent. New file metrics by month Average number of new files per day Average file size in bytes Average Anti-Virus Detection July 279,969 455,027 75.78 % August 237,761 494,817 77.50 % September 219,353 539,299 80.06 % October 233,355 499,807 86.04 % November 271,667 487,029 83.98 % December 251,238 524,770 73.00 % Table 1: File Metrics Q3-Q4 2.3. Detecting Malware At RedSocks Malware Labs we use an in-house classification system for grouping malware. We have classified over 300 types for which we have created detailed statistics. Once multiple anti-virus scanners (in ‘paranoid’ mode) have performed their on-demand scan, we know which malware was detected and, perhaps more importantly, which was not. In the next three figures all the new and unique malicious files per day. The green section shows the percentage of all the files identified by Anti-Virus software and, in red, the percentage of files not detected. Figure 3: Detected vs. Not Detected October 2014 Page 7 of 28 Malware Trend Report Quarter 4, 2014 Figure 5: Detected vs. Not Detected November 2014 Figure 4: Detected vs. Not Detected December 2014 In October, of all the malicious files we processed, about 14 percent of them were not detected by any of the Anti-Virus products we currently use. In November; 16 percent of the samples on average remained undetected. In December; the Anti-Virus detection dropped, missing 27 percent of all malicious samples we processed. In appendix A: “Detecting Malware” you will find detection results by both day and month. Page 8 of 28 Malware Trend Report Quarter 4, 2014 2.4. Classifying Malware We categorise malware according to its primary feature. In the third quarter, malware was grouped as follows: All Malware Adware B&B Exploits Rootkits Trojans Worms Others Adware Droppers Backdoors ADODB (D)DoS Trojans Email-Worms (D)DoS Tools Adware Downloaders Bots HTML Banking Trojans Generic Worms AV Tools Java Batch Trojans IM-Worms Constructors JS FakeAV IRC-Worms DOS based Linux GameThief Trojans Net-Worms Encrypted Malware MSExcel Generic Trojans Net-Worms Flooders MSPPoint IRC Trojans P2P-Worms Fraud Tools MSWord Java Trojan Packed Worms Generic Malware OSX LNK Trojans Script Worms Hack Tools PDF Packed Trojans Macro based Script Password Stealing Trojans Malware Heuristic SWF Proxy Trojans Monitors Win32 Randsom Trojans Nukers Win64 Rogue Trojans Porn-Dialers Script Trojans Porn-Downloaders SMS Trojans Porn-Tools Spy Trojans PSW-Tools Trojan Clickers PUPs Trojan Dialers RemoteAdmin Trojan Downloaders Riskware Trojan Droppers Spammers Trojan Flooders Spoofers Trojan Mailfinder SpyTools Trojan Notifiers Spyware Trojan RATs Suspicious WinREG Trojans Viruses Toolbars Table 2: Malware Categories Q4 The ‘Others’ category consists of malicious samples that do not fit in any of the six main categories. See appendix B: “Classifying Malware” for the numbers by day, category and month. Page 9 of 28 Malware Trend Report Quarter 4, 2014 3. Trends Discovering malware-propagation-trends starts with an analysis of the raw data behind the collection and processing of malware. From October to December, RedSocks Malware Research Labs identified the following trends by malware category. 3.1. Adware During the third quarter, we identified around 3.3 million files as adware. During the fourth quarter, we identified 4.3 million. This is 18.7 percent of all the identified malware, a 4 percent increase compared with the third quarter. Figure 6: Amount of Identified Adware Q4 On the 29th of December, over 119,000 variations of Symmi.49537 were identified. The distribution of Symmi.49537 started on Sunday the 7th of December. The Symmi adware displays ads, usually in the internet browser by modifying displayed pages or opening additional pages which include ads. These adware programs are usually installed by the users themselves or come with other software that the users install themselves (usually in exchange for using the software for free or as a default install option). Users might be unaware that this software was installed or of its behaviour. This detection is meant to flag the file and the behaviour as part of legitimate ad-displaying software. It does not have its own spreading routine. Page 10 of 28 Malware Trend Report Quarter 4, 2014 Figure 7: Distribution of Adware.Symmi.49537 Q4 3.2. Backdoors and Bots Files identified as having been infected with a backdoor, or as having bot functions, made up 1.4 percent in the third quarter. A total of 397,000 files were classified in this category in the fourth quarter. This is 1.7 percent of the total. Figure 8: Amount of Identified Backdoors and Bots Q4 Page 11 of 28 Malware Trend Report Quarter 4, 2014 Since May 2014, the distribution of new and variations of backdoors and bots (B&B), have been low. From the second week of September the numbers are rising again. During the fourth quarter, B&B increased with 0.3 percent. All the spikes in figure 11 from 10,000 and or more are caused largely by variation of the Backdoor.Bot.158614. With over 165,000 unique samples, it was by far the most popular B&B. Figure 9: Distribution of Backdoor.Bot.158614 Q4 3.3. Exploits An exploit is an attack on a computer system, especially one that takes advantage of a particular vulnerability. The amount of exploits doubled compared to the third quarter. They went from 7,109 unique samples to 14,431 in the last quarter of 2014. Of all the samples we processed during the fourth quarter 0.06 percent were categorised as exploit. Page 12 of 28 Malware Trend Report Quarter 4, 2014 Figure 10: Amount of Identified Exploits Q4 Like in the third quarter, variations of the Exploit CVE-2010-0188.C are still very popular among cybercriminals. This exploit identifies malicious PDF files downloaded by the Blackhole exploit-kit that take advantage of a known vulnerability in Adobe Reader. To prevent successful exploitation, install the latest updates available for Adobe Reader and/or remove any old and unnecessary installations. Exploit CVE-2010-0188.C was responsible for all spikes above the 500. From all the identified exploits a stunning 64.55 percent made use of this exploit. 3.4. Rootkits A rootkit is a type of software designed to hide the fact that an operating system has been compromised. This can be done in various ways, such as replacing vital executables or by introducing a new kernel module. Rootkits allow malware to hide in plain sight. Rootkits themselves are not harmful, they are simply used to hide malware, bots and worms. To install a rootkit, an attacker must first gain sufficient access the target operating system. This could be accomplished by using an exploit, by obtaining valid account credentials or through social engineering. Because rootkits are activated before your operating system boots up, they are very difficult to detect and therefore provide a powerful way for attackers to access and use the targeted computer without the owner being aware of it. Due to the way rootkits are used and installed, they are notoriously difficult to remove. Rootkits today are usually not used to gain elevated access, but are instead used to mask malware payloads more effectively. Page 13 of 28 Malware Trend Report Quarter 4, 2014 Figure 11: Amount of Identified Rootkits Q4 In the second and third quarter, we saw a slight drop in the usage of rootkits, and this drop continued in the fourth quarter. Around 800 rootkit families were identified in 9,759 unique files. The first two spikes above 300 are not caused by a specific rootkit family. The spikes on the 11 th and 20th of December were primarily caused by members of Rootkit.15620 with 247 and 173 samples. Page 14 of 28 Malware Trend Report Quarter 4, 2014 3.5. Trojans With more than 9.9 million (43 percent) new unique samples in the fourth quarter of 2014, trojans are by far the biggest category of malware. In the third quarter 8.8 million files (39 percent) were Trojans. An increase of 4 percent. Figure 12: Amount of Identified Trojans Q4 Of all the trojan families, we will only discuss the top three. In third place we find Trojan.Unruy.1, with 115,000 different samples distributed over 86 days ― its best day was on the 21st of November, with almost 15,000 samples. In second place is Trojan.Symmi.47633, with 124,000 files spread over 64 days ― its best day was on the 4th of December. Without a doubt, the most distributed trojan family is Trojan.Kazy.290327: in 92 days we counted nearly a 141,000 new samples. Page 15 of 28 Malware Trend Report Quarter 4, 2014 3.6. Worms In roughly 1.8 million new files we identified worm traces and functionalities. The first spike above 50,000, on the 12th of November, was primarily caused by 44,000 samples of Worm.Generic.514468. On the 24th and the 25th of November, 25,000 and 26,000 minor variations of Win32.Worm.Benjamin.A were counted. Figure 13: Amount of Identified Worms Q3 The top 3 most identified Worm families include: Total Amount First Seen Last Seen Best Day Amount Best Day Days Seen Worm.Generic.514468 155,962 01-10-14 31-12-14 12-11-14 43,566 90 Win32.Worm.P2p.Picsys.C 113,243 01-10-14 31-12-14 06-12-14 21,478 91 Win32.Worm.Benjamin.A 96,083 01-10-14 30-12-14 25-11-14 25,622 65 AV-Identifier Table 3: Top 3 Worm Families Q4 2014 Compared with the third quarter, a slight decrease in worm usage can be seen. In the third quarter 7.97 percent were worms. For the fourth quarter 7.63 percent of the total was classified as worm. Page 16 of 28 Malware Trend Report Quarter 4, 2014 3.7. 64-bit Malware Malware designed to run on Windows 64-bit was identified in 205,000 new malicious files in the fourth quarter - a gigantic increase when compared with the 33,000 of the third quarter. From all new files, 0.89 percent was able to infect 64-bit Windows files. Figure 14: Amount of Identified 64-Bit Malware Q4 Expiro ―designed to infect 32-bit and 64-bit files― aims to maximise profit and infects executable files on local, removable and network drives. As for the payload, this malware installs extensions for the Google Chrome and Mozilla Firefox browsers. The malware also steals stored certificates and passwords from Internet Explorer, Microsoft Outlook and from the FTP client FileZilla. Browser extensions are used to redirect the user to a malicious URL as well as to hijack confidential information, such as account credentials or online banking information. The virus disables some services on the compromised computer, including Windows Defender and Windows Security Center, and can also terminate processes. In the third quarter a drop in the old Expiro usage and the rise of the second and third generation was seen. The Expiro third generation variations were seen three times more than the second generation in the fourth quarter. In figure 18 we can see the seven 64-bit families we intercepted and the amount of files which were infected by them. Page 17 of 28 Malware Trend Report Quarter 4, 2014 Figure 15: 64-bit Malware Families Q4 3.8. Malicious Others After the adware, B&Bs, exploits, rootkits, worms, and the 64-bit malware, we are still left with 6.4 million identified malicious files. This is 28 percent of the total of this quarter and a decrease of 7.7 percent compared with the third quarter. Figure 16: Other Malware Q4 Page 18 of 28 Malware Trend Report Quarter 4, 2014 In table 4, we divided the others over 10 categories. Q4 Category Count % of total Q3 +/- Count % of total +/- DOS based 5,162 0.027 % +0.018 % 2,070 0.009 % -0.089 % Encrypted Malware 9,093 0.048 % +0.002 % 10,361 0.046 % -0.011 % 4.018,331 21.031 % +2.988 % 4,083,268 18.043 % +3.660 % 7,303 0.038 % -0.004 % 9,530 0.042 % -0.024 % Malware Heuristic 465,868 2.438 % +1.760 % 153,411 0.678 % -0.355 % PUPs 768,098 4.020 % -5.207 % 2,088,143 9.227 % +0.456 % 72 0.000 % -0.001 % 138 0.001 % 0.000 % 149,338 0.782 % +0.507 % 62,181 0.275 % +0.071 % 5,256 0.028 % +0.013 % 3,448 0.015 % -0.062 % 909 0.005 % -0.007 % 2,784 0.012 % -0.012 % 5,430,428 28.421 % +0.072 % 6,415,335 28.349 % +3.633 % Generic Malware Macro based Riskware Suspicious (Hack)Tools Windows viruses Total Table 4: Other Malware Q4 vs. Q3 % of total: +/-: Windows viruses: The percentage of the category of all the malicious files processed in that quarter. Increase/decrease in percentage compared with the quarter before. These are so called classic viruses for Microsoft Windows, true file infectors. Using generic malware detection we found Ramnit.N leftovers and infections in 1.1 million files. Ramnit.N spreads by infecting EXE, DLL, and HTML files; it can also be distributed via removable drives. Once active, the virus infects EXE, DLL and HTML files found on the computer. It will also drop a malicious file that attempts to connect to and download other files from a remote server. Page 19 of 28 Malware Trend Report Quarter 4, 2014 4. Geolocation Last quarter, we located RAT hotspots by plotting the servers with the most traffic and connections on a map. RATs are short for Remote Administration Trojans or Remote Access Trojans (sometimes described as Remote Access Tools1). This quarter we look at GoSmartVPS. According to their own website; GoSmartVPS provides cheap and affordable high quality virtual private servers. “We're excited to start offering virtual private servers for as low as $7/mo. With no long term contracts and a 72 hour cancellation policy, there's no risk to try out GoSmartVPS!”. This VPS (Virtual Private Server) network seems to host only botnet controllers (range 104.192.103.0/24): 104.192.103.10/32 104.192.103.20/32 104.192.103.21/32 104.192.103.22/32 104.192.103.28/32 104.192.103.29/32 104.192.103.4/32 104.192.103.41/32 104.192.103.45/32 104.192.103.5/32 104.192.103.72/32 104.192.103.8/32 104.192.103.80/32 104.192.103.9/32 104.192.103.91/32 104.192.103.92/32 104.192.103.94/32 controller controller controller controller controller controller controller controller controller controller controller controller controller controller controller controller controller no no no no no no no no no no no no no no no no no RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Zeus Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Zeus Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller RSMIT-NLS - Citadel Botnet Controller GoSmartVPS 104.192.103.0/24 - DNS Registrations: http://bgp.he.net/net/104.192.103.0/24#_dns 104.192.103.7 ns1.fireballs.asia, ns2.fireballs.asia 104.192.103.9 aaaaaaaaaaaaaaaaaaaazzzzzzzzzzzzzzzzzzzzzzbbbbbbbbbbbb.net 104.192.103.50 gosmartvps.com 104.192.103.71 onetapgaming.net Domain Name: GOSMARTVPS.COM Registrar: ENOM, INC. Sponsoring Registrar IANA ID: 48 Whois Server: whois.enom.com Referral URL: http://www.enom.com Name Server: NS-1370.AWSDNS-43.ORG Name Server: NS-153.AWSDNS-19.COM Name Server: NS-1590.AWSDNS-06.CO.UK Name Server: NS-975.AWSDNS-57.NET Status: clientTransferProhibited 1 These are not regular administrator tools, but ones which are developed and used for malicious remote access. Page 20 of 28 Malware Trend Report Quarter 4, 2014 Updated Date: 17-sep-2014 Creation Date: 20-jul-2014 Expiration Date: 20-jul-2015 Website: https://www.gosmartvps.com/ At the moment GoSmartVPS seems to be down. But daily we see new Citadel Botnet Controllers added to the network daily. Top 10 Countries Hosting C&C July United States August 1,491 United States September 1,163 United States 870 Russian Federation 521 Russian Federation 529 Russian Federation 446 Germany 315 Germany 318 Germany 260 United Kingdom 311 United Kingdom 302 United Kingdom 259 Netherlands 225 Netherlands 208 Netherlands 156 China 216 Ukraine 202 China 152 Ukraine 160 China 196 Turkey 146 Korea 132 Turkey 154 Ukraine 130 France 129 Korea 137 Korea 102 Turkey 129 France 132 France 101 Table 5: Top 10 Countries Hosting C&C Servers Q3 In the third quarter the United States still led the pack, followed by the Russian Federation and Germany: Top 10 Countries Hosting C&C October November December United States 841 United States 898 United States 723 Russian Federation 471 Russian Federation 470 Russian Federation 513 Germany 282 United Kingdom 261 Germany 260 United Kingdom 265 Germany 247 United Kingdom 242 Netherlands 159 Netherlands 167 Netherlands 202 Turkey 142 China 146 Ukraine 163 Ukraine 140 Ukraine 143 China 144 China 139 Brazil 116 France 131 Brazil 128 France 113 India 113 France 115 Korea 94 Brazil 110 Table 6: Top 10 Countries Hosting C&C Servers Q4 The C&C Servers hosted in The Netherlands increased slightly during the last quarter. New on the list are C&C Servers hosted in India and Brazil. In total 11,642 active C&C servers were found and added to our blacklist (4,050 in October, 3,875 November, and 3,717 in December). And last but not least, below are some backdoors we found on North Korean IP’s (all 1024 IP’s): Page 21 of 28 Malware Trend Report Quarter 4, 2014 http://totalhash.com/analysis/073725e127fb502e3f54934945346267baf4c6bd IP : 175.45.176.1/32 (Past: 183.207.184.195/32, 59.181.114.31/32) Port : 7070/TCP Domain : hxxp://fgwegasgxcxb.ddns.net Totalhash : http://totalhash.com/analysis/cd353c72769a014eb41bd93befd614239ca9bb3c Detection : Dynamer, ServStart, Vehidis inetnum: 175.45.176.0 - 175.45.179.255 netname: STAR-KP descr: Ryugyong-dong descr: Potong-gang District country: KP 175.45.176.0/24 175.45.177.0/24 175.45.178.0/24 175.45.179.0/24 badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea) badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea) badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea) badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea) Page 22 of 28 Malware Trend Report Quarter 4, 2014 5. Final Word In the third quarter of 2014, the total number of new malicious files processed was 21.6 million. For the fourth quarter it was 23.2 million ― an increase of 2.4 percent. The overall detection by Anti-Virus software improved by 3.32 percent compared with the third quarter. Altogether, around 4.4 million malicious files went undetected during the fourth quarter. By grouping and classifying the identified malware, we detected a decrease of popularity in 3 of the 7 main malware categories during the third quarter. These three categories are: rootkits, worms and others. The remaining four categories (adware, B&B, exploits, and trojans) increased. Category Adware Backdoors & Bots Exploits Rootkits Total % of Total +/- compared to Q3 4,326,069 18.669 % +4.008 % Adware.Linkury.M 361,707 396,885 1.713 % +0.436 % Backdoor.Bot.158614 165,197 14,431 0.062 % +0.031 % Exploit:W32/CVE-2010-0188.C Largest Family Total number Q4 7,014 9,759 0.042 % -0.015 % OnLineGames.1 Trojans 9,951,148 42.944% +3.988 % Gen:Variant.Kazy.290327 171,419 924 Worms 1,767,901 7.629 % -0.343 % Worm.Generic.514468 174,784 Others 6,706,193 28.940 % -7.706 % Win32.Ramnit.N 1,117,874 Table 7: Malware Categories Q3 vs. Q4 Within the top 10 countries hosting C&C servers, there was little change. The top 3 countries stayed the same during the fourth quarter. United States led the third quarter of 2014, followed by the Russian Federation. Germany and the United Kingdom switched places three and four. The Netherlands kept the 5th place in the fourth quarter. 5.1. Miscreants say "Je suis Charlie" too With thanks to Ashwin K. Vamshi from Blue Coat2: January 14, 2015 It is very common for malicious actors to attempt to exploit trending news in order to lure users to execute malicious programs. As a regular practice we keep track of such instances. In the most recent case I happened to come across an interesting malware (md5 hash 3c5266cab10c78f3a49985806c217a40) with the theme "Je Suis Charlie", a slogan that has gone viral after the 7 January 2015 massacre at the Charlie Hebdo offices in Paris. This malware was found in our stream of incoming material so we don't yet know how it has been distributed. It is likely, given the subject, that it has been attempted to be spread using some kind of social engineering trick. The malware in question is the infamous DarkComet RAT, a freely available remote administration tool which also can double as a powerful backdoor trojan. DarkComet was originally developed by the French hacker DarkCoderSc, who stopped further development on the project in 2012. Nevertheless, its ease of 2 https://www.bluecoat.com/security-blog/2015-01-14/miscreants-say-je-suis-charlie-too Page 23 of 28 Malware Trend Report Quarter 4, 2014 use and rich set of features have kept it popular by all sorts of attackers – from script kiddies and activists to more sinister players. The variant used in the present attack is obfuscated to make it less noticed by AV scanners. The DarkComet Delphi code is enveloped in a .NET wrapper, making the telltale signs of DarkComet hard to spot. Indeed, the AV detection rate of this executable is at the time of writing poor – only 2/53 scanners had detection on the VirusTotal online scanner service. The sample drops a copy of itself with the name svchost.exe and launches an image of a new-born baby with a band carrying the name “Je suis Charlie”. This image appears to have been harvested from public sources. Figure 17: Je Suis Charlie The sample also displays a message in French to mislead the user to believe that the binary is created a previous version of MovieMaker: Figure 18: Fake Movie Maker Message The Command and Control host is a subdomain under the no-ip dynamic DNS domain. This is a well-known legitimate dynamic DNS service which is however often used by malicious actors. The actual domain address is: snakes63.no-ip.org This address currently resolves to an IP address located with the French service provider Orange. The French IP address and the error message in French reinforces the impression that this malware was targeted at French users, though we have no indication as to who the attackers are or what they are after. The French authorities have been informed about this malware. We will continue to monitor activities in this space and keep you posted. For now, just be alert that items of great media interest like this may contain malware. There really is nothing so sacred that bad people won’t try to exploit it. We hope you that you enjoyed our last Malware Trend Report of 2014 and that it provides you with insight into the trends we have seen during the fourth quarter of 2014. We continue to innovate, so please check back with us for our next quarterly trend report. Questions, comments and requests can be directed towards the RedSocks Malware Research Labs. RedSocks B.V. W: www.redsocks.nl T: +31 (0) 55 36 61 396 E: [email protected] G.J.Vroon Anti-Malware Behavioural Researcher Page 24 of 28 Malware Trend Report Quarter 4, 2014 Appendix A: Detecting Malware October Day Files/day Detected November Undetected Files/day Detected December Undetected Files/day Detected Undetected 1 221,937 200,528 21,408 236,090 206,643 29,448 244,116 164,287 79,829 2 168,499 161,146 7,354 201,200 164,018 37,182 184,865 115,627 69,238 3 361,909 338,775 23,134 213,385 136,869 76,516 332,940 249,940 83,000 4 153,901 137,034 16,867 205,116 177,877 27,239 246,356 217,720 28,636 5 124,380 109,983 14,398 271,873 218,853 53,020 176,054 139,133 36,921 6 301,671 250,114 51,557 239,222 188,029 51,193 264,365 230,824 33,541 7 258,230 216,171 42,059 316,480 264,800 51,680 251,041 188,247 62,794 8 228,246 185,867 42,379 297,104 242,714 54,389 210,009 152,055 57,954 9 239,393 204,431 34,961 291,190 240,353 50,837 272,098 257,446 14,651 10 277,362 228,366 48,996 246,214 201,994 44,220 208,351 181,309 27,042 11 259,950 211,244 48,707 354,297 277,742 76,554 244,919 171,534 73,385 12 306,124 247,136 58,988 341,688 320,380 21,308 266,031 102,453 163,578 13 207,723 175,397 32,327 310,112 276,394 33,718 257,518 196,878 60,640 14 276,737 230,297 46,440 263,443 234,911 28,531 256,524 148,015 108,509 15 299,877 260,408 39,469 284,533 241,486 43,047 278,860 106,409 172,451 16 263,683 232,631 31,052 289,192 240,825 48,367 227,842 178,681 49,161 17 224,200 184,926 39,274 262,500 242,366 20,134 221,496 167,886 53,610 18 161,020 120,651 40,369 310,643 234,577 76,066 274,758 211,455 63,303 19 177,721 145,891 31,830 293,911 272,024 21,888 212,262 157,201 55,061 20 311,035 231,104 79,931 309,302 222,826 86,476 308,861 243,483 65,378 21 249,389 220,454 28,935 269,771 251,213 18,558 258,537 186,288 72,249 22 276,690 253,374 23,316 222,693 190,708 31,984 268,484 199,313 69,171 23 216,372 207,158 9,214 382,913 289,522 93,391 252,430 170,555 81,876 24 248,500 223,505 24,996 220,827 198,747 22,080 269,492 194,215 75,278 25 150,332 128,447 21,885 318,781 246,505 72,276 188,857 135,065 53,793 26 177,292 159,228 18,063 207,452 197,750 9,702 203,579 164,761 38,818 27 194,929 166,240 28,689 206,615 179,730 26,885 275,716 195,061 80,655 28 188,917 163,458 25,459 280,991 228,548 52,443 261,654 184,278 77,376 29 221,939 199,706 22,234 290,104 254,482 35,622 433,501 390,679 42,822 30 250,993 233,906 17,087 212,383 183,670 28,713 215,112 150,613 64,499 221,742 154,493 67,249 8,150,022 6,826,555 1,323,467 7,788,369 5,705,903 2,082,467 31 235,042 207,665 27,377 7,233,995 6,235,241 971,377 Page 25 of 28 Malware Trend Report Quarter 4, 2014 Appendix B: Classifying Malware October Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 29,142 3,666 32 67 91,371 21,971 2 30,304 4,015 11 48 66,061 16,921 51,139 3 59,977 3,392 84 37 158,731 38,781 100,906 4 16,499 1,716 49 35 68,273 19,933 47,396 5 16,258 1,175 24 45 51,170 16,586 39,123 6 53,250 3,566 273 110 109,577 15,555 119,340 7 48,607 6,307 31 58 108,077 12,122 83,028 8 37,251 6,769 18 68 98,111 12,690 73,339 9 41,105 8,975 13 44 112,391 15,580 61,284 10 54,341 9,832 180 42 114,025 15,720 83,222 11 54,726 7,303 37 75 102,938 14,279 80,592 12 82,129 3,810 26 76 86,788 16,360 116,935 13 44,742 6,363 98 35 61,265 13,382 81,839 14 47,803 4,727 35 39 76,580 32,953 114,600 15 34,787 5,415 45 82 140,987 29,158 89,404 16 37,506 8,213 32 53 82,135 27,071 108,673 17 40,128 1,499 142 45 96,503 9,970 75,914 18 46,505 1,229 200 264 56,228 5,402 51,194 19 41,966 963 0 53 56,649 11,941 66,149 20 65,477 2,681 92 1,035 112,007 19,718 110,024 21 35,952 2,953 45 450 118,511 16,512 74,966 22 34,956 2,282 27 27 144,081 10,863 84,453 23 23,879 2,219 326 21 111,415 8,553 69,960 24 38,910 2,961 12 44 100,932 12,110 93,532 25 51,613 1,925 37 23 48,131 2,910 45,693 26 24,172 2,210 3 12 69,035 4,614 77,245 27 19,102 2,048 2 7 97,727 8,190 67,854 28 28,489 1,660 12 28 86,147 13,727 58,854 29 33,507 3,472 2 67 96,669 15,447 72,775 30 13,067 3,107 9 15 131,188 8,435 95,171 31 31,450 2,414 13 36 122,161 3,789 75,179 1,217,599 118,868 1,911 3,042 2,975,865 471,243 2,445,466 Total 75,685 Page 26 of 28 Malware Trend Report Quarter 4, 2014 November Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 41,245 2,718 15 59 109,422 8,238 74,393 2 59,454 1,022 15 127 83,944 5,188 51,449 3 84,670 631 12 35 65,116 1,322 61,599 4 101,514 895 390 67 60,653 5,471 36,126 5 72,242 1,592 67 67 138,849 3,278 55,778 6 62,446 5,223 218 89 111,430 4,288 55,527 7 56,531 7,460 9 90 171,434 5,596 75,360 8 61,808 2,957 7 86 137,932 4,833 89,480 9 58,441 3,525 23 57 133,497 10,960 84,687 10 54,751 3,544 18 52 86,853 31,226 69,769 11 62,319 5,447 28 69 166,658 36,641 83,134 12 62,788 5,231 13 67 150,523 37,257 85,809 13 58,887 1,718 31 65 167,962 25,362 56,086 14 35,560 1,225 17 56 158,468 7,537 60,581 15 39,295 3,161 33 78 173,699 10,661 57,605 16 43,774 2,657 51 83 138,981 17,628 86,017 17 37,906 5,059 2,415 24 106,590 32,967 77,539 18 58,854 2,522 25 44 164,994 14,302 69,901 19 59,746 4,753 5 59 147,367 7,640 74,341 20 77,683 1,669 40 90 146,790 14,164 68,864 21 48,703 1,233 723 27 142,161 6,934 69,989 22 34,302 18,933 75 56 73,852 19,613 75,861 23 82,842 12,959 20 111 126,202 60,047 100,731 24 32,160 4,326 10 50 79,995 47,645 56,641 25 46,584 5,346 6 69 126,701 71,258 68,818 26 38,982 2,279 26 65 97,518 20,353 48,229 27 36,650 1,785 15 27 80,136 20,019 67,984 28 57,060 2,687 5 62 106,854 39,141 75,182 29 40,060 8,931 5 47 99,668 39,549 101,843 30 Totals 39,580 14,555 12 50 64,540 13,377 80,269 1,646,838 136,044 4,330 1,928 3,618,792 622,496 2,119,594 Page 27 of 28 Malware Trend Report Quarter 4, 2014 December Day Adware Backdoors Exploits Rootkits Trojans Worms Other 1 39,265 18,815 7 54 92,313 14,661 2 28,897 9,442 7 22 65,362 15,609 65,525 3 35,607 1,880 37 164 141,543 35,908 117,801 4 25,775 1,208 30 65 144,917 19,731 54,629 5 23,194 1,490 517 34 66,620 22,771 61,430 6 45,800 2,748 20 101 94,756 47,126 73,814 7 41,206 5,541 0 55 87,010 32,907 84,322 8 45,462 2,861 4 48 70,705 23,010 67,919 9 55,710 5,694 86 142 101,928 27,473 81,064 10 37,945 4,554 174 106 83,780 22,715 59,075 11 25,175 4,559 386 650 126,473 30,280 57,396 12 37,504 4,729 324 123 126,558 41,199 55,595 13 39,202 9,316 474 68 120,159 42,448 45,852 14 36,162 11,512 2,103 79 104,305 41,233 61,131 15 44,627 5,781 1,219 160 137,880 37,848 51,345 16 21,624 5,478 634 70 121,225 32,882 45,929 17 26,407 9,218 432 84 92,989 23,183 69,183 18 67,248 5,536 536 80 100,682 18,232 82,444 19 46,051 4,819 360 86 64,168 12,577 84,200 20 40,203 5,984 184 630 142,592 13,407 105,860 21 45,744 1,425 132 46 100,397 13,382 97,411 22 33,292 1,442 43 43 119,016 22,089 92,560 23 47,187 2,370 45 416 102,963 19,049 80,402 24 32,876 2,243 52 406 147,316 14,884 71,715 25 32,356 1,827 36 317 106,349 4,669 43,303 26 60,059 2,060 110 184 94,786 4,591 41,790 27 48,119 1,852 42 84 112,986 9,451 103,182 28 74,095 1,776 30 184 100,224 5,910 79,435 29 227,926 2,910 56 172 183,228 10,820 8,390 30 46,262 1,484 16 62 105,311 6,928 55,048 31 Totals 79,000 50,651 1,420 95 50 97,952 7,187 64,386 1,461,631 141,973 8,191 4,788 3,356,490 674,163 2,141,133 Page 28 of 28 REDSOCKS RedSocks is a Dutch company specialised in malware detection. RedSocks supplies RedSocks malware threat defender as a network appliance. This innovative appliance analyses digital traffic flows in real time based on the algorithms and lists of malicious indicators compiled by the RedSocks Malware Intelligence Team. This team consists of specialists in identifying new threats on the internet and translating them into state-of-the-art malware detection. www.redsocks.eu Laan van Nieuw-Oost Indië 133f, 2593 BM Den Haag Tel +31 (0)88 13 33 333 E-mail [email protected] Website www.redsocks.neu
© Copyright 2026 Paperzz