- RedSocks Security

Malware Trend Report, Q4 2014
October | November | December
January 2015
Copyright RedSocks B.V. © 2014-2015.
All Rights Reserved.
Malware Trend Report
Quarter 4, 2014
This page is left blank on purpose.
Page 1 of 28
Malware Trend Report
Quarter 4, 2014
Table of Contents
1. Introduction .............................................................................................................................................. 4
2. Summary .................................................................................................................................................. 5
2.1. Collecting Malware ............................................................................................................................. 6
2.2. Processing Malware ........................................................................................................................... 6
2.3. Detecting Malware ............................................................................................................................. 7
2.4. Classifying Malware ........................................................................................................................... 9
3. Trends ..................................................................................................................................................... 10
3.1. Adware ............................................................................................................................................. 10
3.2. Backdoors and Bots ...........................................................................................................................11
3.3. Exploits ............................................................................................................................................. 12
3.4. Rootkits .............................................................................................................................................13
3.5. Trojans ............................................................................................................................................. 15
3.6. Worms.............................................................................................................................................. 16
3.7. 64-bit Malware ..................................................................................................................................17
3.8. Malicious Others............................................................................................................................... 18
4. Geolocation ............................................................................................................................................ 20
5. Final Word ............................................................................................................................................... 23
5.1. Miscreants say "Je suis Charlie" too .................................................................................................. 23
Appendix A: Detecting Malware ................................................................................................................. 25
Appendix B: Classifying Malware ................................................................................................................ 26
Page 2 of 28
Malware Trend Report
Quarter 4, 2014
Table of Figures
Figure 1: Unique Malicious Files Q3-Q4 2014 ................................................................................................ 6
Figure 2: Space Need To Store New Malicious Files Q3-Q4 2014 .................................................................. 6
Figure 3: Detected vs. Not Detected October 2014 ....................................................................................... 7
Figure 4: Detected vs. Not Detected December 2014 ................................................................................... 8
Figure 5: Detected vs. Not Detected November 2014 ................................................................................... 8
Figure 6: Amount of Identified Adware Q4 ................................................................................................. 10
Figure 7: Distribution of Adware.Symmi.49537 Q4 ......................................................................................11
Figure 8: Amount of Identified Backdoors and Bots Q4 ...............................................................................11
Figure 9: Distribution of Backdoor.Bot.158614 Q4 ...................................................................................... 12
Figure 10: Amount of Identified Exploits Q4 ................................................................................................13
Figure 11: Amount of Identified Rootkits Q4 ............................................................................................... 14
Figure 12: Amount of Identified Trojans Q4 ................................................................................................ 15
Figure 13: Amount of Identified Worms Q3 ................................................................................................. 16
Figure 14: Amount of Identified 64-Bit Malware Q4 .....................................................................................17
Figure 15: 64-bit Malware Families Q4 ........................................................................................................ 18
Figure 16: Other Malware Q4 ...................................................................................................................... 18
Figure 17: Je Suis Charlie ............................................................................................................................. 24
Figure 18: Fake Movie Maker Message........................................................................................................ 24
Table of Tables
Table 1: File Metrics Q3-Q4 ........................................................................................................................... 7
Table 2: Malware Categories Q4 ................................................................................................................... 9
Table 3: Top 3 Worm Families Q4 2014 ....................................................................................................... 16
Table 4: Other Malware Q4 vs. Q3 .............................................................................................................. 19
Table 5: Top 10 Countries Hosting C&C Servers Q3 ..................................................................................... 21
Table 6: Top 10 Countries Hosting C&C Servers Q4 .................................................................................... 21
Table 7: Malware Categories Q3 vs. Q4 ....................................................................................................... 23
Page 3 of 28
Malware Trend Report
Quarter 4, 2014
1. Introduction
This is the last quarterly trend report for 2014 from the RedSocks Malware Research Lab for 2014.
RedSocks is a Dutch company specializing in malware detection. Our solution, RedSocks Malware Threat
Defender, is a network appliance that analyses digital traffic flows in real-time, based on algorithms and
lists of malicious indicators. This critical information is compiled by the RedSocks Malware Intelligence
Team (RSMIT). The team consists of specialists whose job is to identify new threats and trends on the
Internet and to translate them into state-of-the-art malware detection capabilities.
With this report, we hope to provide the reader with a deeper insight into the trends we see in the malware
we process as we look at data collected during the fourth quarter of 2014. At RedSocks we analyses large
numbers of malicious files on a daily basis, therefore we can cover only a few topics briefly in this trend
report.
Protecting your data from Internet-based threats is not an easy task, and relying solely on protection from
Anti-Virus companies - no matter how established their brand - is not enough. Comprehensive protection
requires an entirely new approach.
Page 4 of 28
Malware Trend Report
Quarter 4, 2014
2. Summary
The total number of new and unique malicious files processed per month went from 7.2 million in October
to 8.2 million in November, and down to 7.8 million in December.
The overall detection by Anti-Virus software this quarter was roughly 5 percent lower compared to the third
quarter. The detection rate for October was 86.31 percent. For November, it is 83.98 percent and in
December, the average detection was only 73.0 percent. This might not sound too bad, but it means that
around 14 percent, 16 percent and 27 percent, respectively, were not detected. Please note that
identification rates can change based on samples chosen and time scanned.
During the fourth quarter, the number of identified adware went up from 1.2 million in October to 1.6
million in November only to drop to 1.5 million in December.
During the third quarter the amount of identified backdoors and bots (B&B) increased from 117,000 to
140,000. In the last quarter of 2014, the B&B start in October with 119.000 unique samples, which increased
to 136.000 in November and 142.000 in December.
Only 0.03 percent of the files were detected by the Anti-Virus software as exploit and 0.04 percent as
rootkit in October by Anti-Virus software. In November, 0.06 percent were detected as rootkits and 0.02
percent as exploits. For December it is 0.11 percent exploits and 0.06 percent rootkits.
Like in the first, second, and third quarter of this year, trojans are by far the most popular type of malware.
In October, they made up for 3 million, and in November and December, 3.6 million.
In October, 471,000 worm files were identified. In November, the number increased to 622,000. In
December, 674,000 worms were added to our databases.
Grouped together, all other malicious files such as flooders, hacktools, spoofers, spyware, viruses, etc.,
make up for 34, 26 and 28 percent of the total for October, November and December, respectively.
As in the third quarter, most Command & Control (C&C) servers were hosted in the United States, followed
by the Russian Federation. Germany could be found on the third place, but lost it to the United Kingdom.
The Netherlands, like in the third quarter, can be found at 5th.
Page 5 of 28
Malware Trend Report
Quarter 4, 2014
2.1. Collecting Malware
At the RedSocks Malware Research Labs, we track large numbers of malware from our globally-distributed
honeypots, honey-clients, spam-nets and various botnet monitoring sensors. Due to the distribution of our
honeypots, we are able to automatically collect and process new malicious samples from across the globe.
We also exchange large quantities of malicious files with the Anti-Virus industry.
Figure 1: Unique Malicious Files Q3-Q4 2014
2.2. Processing Malware
Working with malware is what we love to do. More than 200,000 new malicious files arrive every day at our
automated malware collecting machines.
Figure 2: Space Need To Store New Malicious Files Q3-Q4 2014
Page 6 of 28
Malware Trend Report
Quarter 4, 2014
All samples were renamed according to their hash calculation. We then check to see if that particular piece
of malware has already been processed.
In figure 2, the total amount of disk space needed to store all the new malicious files in gigabytes. While
the numbers of new malicious files stayed more or less the same, the average file size decreased a little bit.
During the second quarter, we saw that malicious files, on average, shrunk 12.73 percent. During the third
quarter, the average file size increased with 118.52 percent.
New file metrics by month
Average number of new files per day
Average file size in bytes
Average Anti-Virus Detection
July
279,969
455,027
75.78 %
August
237,761
494,817
77.50 %
September
219,353
539,299
80.06 %
October
233,355
499,807
86.04 %
November
271,667
487,029
83.98 %
December
251,238
524,770
73.00 %
Table 1: File Metrics Q3-Q4
2.3. Detecting Malware
At RedSocks Malware Labs we use an in-house classification system for grouping malware. We have
classified over 300 types for which we have created detailed statistics. Once multiple anti-virus scanners (in
‘paranoid’ mode) have performed their on-demand scan, we know which malware was detected and,
perhaps more importantly, which was not.
In the next three figures all the new and unique malicious files per day. The green section shows the
percentage of all the files identified by Anti-Virus software and, in red, the percentage of files not detected.
Figure 3: Detected vs. Not Detected October 2014
Page 7 of 28
Malware Trend Report
Quarter 4, 2014
Figure 5: Detected vs. Not Detected November 2014
Figure 4: Detected vs. Not Detected December 2014
In October, of all the malicious files we processed, about 14 percent of them were not detected by any of
the Anti-Virus products we currently use. In November; 16 percent of the samples on average remained
undetected. In December; the Anti-Virus detection dropped, missing 27 percent of all malicious samples we
processed.
In appendix A: “Detecting Malware” you will find detection results by both day and month.
Page 8 of 28
Malware Trend Report
Quarter 4, 2014
2.4. Classifying Malware
We categorise malware according to its primary feature. In the third quarter, malware was grouped as
follows:
All Malware
Adware
B&B
Exploits
Rootkits
Trojans
Worms
Others
Adware Droppers
Backdoors
ADODB
(D)DoS Trojans
Email-Worms
(D)DoS Tools
Adware Downloaders
Bots
HTML
Banking Trojans
Generic Worms
AV Tools
Java
Batch Trojans
IM-Worms
Constructors
JS
FakeAV
IRC-Worms
DOS based
Linux
GameThief Trojans
Net-Worms
Encrypted Malware
MSExcel
Generic Trojans
Net-Worms
Flooders
MSPPoint
IRC Trojans
P2P-Worms
Fraud Tools
MSWord
Java Trojan
Packed Worms
Generic Malware
OSX
LNK Trojans
Script Worms
Hack Tools
PDF
Packed Trojans
Macro based
Script
Password Stealing
Trojans
Malware Heuristic
SWF
Proxy Trojans
Monitors
Win32
Randsom Trojans
Nukers
Win64
Rogue Trojans
Porn-Dialers
Script Trojans
Porn-Downloaders
SMS Trojans
Porn-Tools
Spy Trojans
PSW-Tools
Trojan Clickers
PUPs
Trojan Dialers
RemoteAdmin
Trojan
Downloaders
Riskware
Trojan Droppers
Spammers
Trojan Flooders
Spoofers
Trojan Mailfinder
SpyTools
Trojan Notifiers
Spyware
Trojan RATs
Suspicious
WinREG Trojans
Viruses
Toolbars
Table 2: Malware Categories Q4
The ‘Others’ category consists of malicious samples that do not fit in any of the six main categories.
See appendix B: “Classifying Malware” for the numbers by day, category and month.
Page 9 of 28
Malware Trend Report
Quarter 4, 2014
3. Trends
Discovering malware-propagation-trends starts with an analysis of the raw data behind the collection and
processing of malware. From October to December, RedSocks Malware Research Labs identified the
following trends by malware category.
3.1. Adware
During the third quarter, we identified around 3.3 million files as adware. During the fourth quarter, we
identified 4.3 million. This is 18.7 percent of all the identified malware, a 4 percent increase compared with
the third quarter.
Figure 6: Amount of Identified Adware Q4
On the 29th of December, over 119,000 variations of Symmi.49537 were identified. The distribution of
Symmi.49537 started on Sunday the 7th of December.
The Symmi adware displays ads, usually in the internet browser by modifying displayed pages or
opening additional pages which include ads. These adware programs are usually installed by the users
themselves or come with other software that the users install themselves (usually in exchange for using
the software for free or as a default install option).
Users might be unaware that this software was installed or of its behaviour. This detection is meant to
flag the file and the behaviour as part of legitimate ad-displaying software. It does not have its own
spreading routine.
Page 10 of 28
Malware Trend Report
Quarter 4, 2014
Figure 7: Distribution of Adware.Symmi.49537 Q4
3.2. Backdoors and Bots
Files identified as having been infected with a backdoor, or as having bot functions, made up 1.4 percent in
the third quarter. A total of 397,000 files were classified in this category in the fourth quarter. This is 1.7
percent of the total.
Figure 8: Amount of Identified Backdoors and Bots Q4
Page 11 of 28
Malware Trend Report
Quarter 4, 2014
Since May 2014, the distribution of new and variations of backdoors and bots (B&B), have been low. From
the second week of September the numbers are rising again. During the fourth quarter, B&B increased with
0.3 percent.
All the spikes in figure 11 from 10,000 and or more are caused largely by variation of the
Backdoor.Bot.158614. With over 165,000 unique samples, it was by far the most popular B&B.
Figure 9: Distribution of Backdoor.Bot.158614 Q4
3.3. Exploits
An exploit is an attack on a computer system, especially one that takes advantage of a particular
vulnerability. The amount of exploits doubled compared to the third quarter. They went from 7,109 unique
samples to 14,431 in the last quarter of 2014.
Of all the samples we processed during the fourth quarter 0.06 percent were categorised as exploit.
Page 12 of 28
Malware Trend Report
Quarter 4, 2014
Figure 10: Amount of Identified Exploits Q4
Like in the third quarter, variations of the Exploit CVE-2010-0188.C are still very popular among
cybercriminals. This exploit identifies malicious PDF files downloaded by the Blackhole exploit-kit that take
advantage of a known vulnerability in Adobe Reader. To prevent successful exploitation, install the latest
updates available for Adobe Reader and/or remove any old and unnecessary installations.
Exploit CVE-2010-0188.C was responsible for all spikes above the 500. From all the identified exploits a
stunning 64.55 percent made use of this exploit.
3.4. Rootkits
A rootkit is a type of software designed to hide the fact that an operating system has been compromised.
This can be done in various ways, such as replacing vital executables or by introducing a new kernel
module. Rootkits allow malware to hide in plain sight. Rootkits themselves are not harmful, they are simply
used to hide malware, bots and worms.
To install a rootkit, an attacker must first gain sufficient access the target operating system. This could be
accomplished by using an exploit, by obtaining valid account credentials or through social engineering.
Because rootkits are activated before your operating system boots up, they are very difficult to detect and
therefore provide a powerful way for attackers to access and use the targeted computer without the owner
being aware of it. Due to the way rootkits are used and installed, they are notoriously difficult to remove.
Rootkits today are usually not used to gain elevated access, but are instead used to mask malware payloads
more effectively.
Page 13 of 28
Malware Trend Report
Quarter 4, 2014
Figure 11: Amount of Identified Rootkits Q4
In the second and third quarter, we saw a slight drop in the usage of rootkits, and this drop continued in the
fourth quarter. Around 800 rootkit families were identified in 9,759 unique files.
The first two spikes above 300 are not caused by a specific rootkit family. The spikes on the 11 th and 20th of
December were primarily caused by members of Rootkit.15620 with 247 and 173 samples.
Page 14 of 28
Malware Trend Report
Quarter 4, 2014
3.5. Trojans
With more than 9.9 million (43 percent) new unique samples in the fourth quarter of 2014, trojans are by far
the biggest category of malware. In the third quarter 8.8 million files (39 percent) were Trojans. An increase
of 4 percent.
Figure 12: Amount of Identified Trojans Q4
Of all the trojan families, we will only discuss the top three. In third place we find Trojan.Unruy.1, with
115,000 different samples distributed over 86 days ― its best day was on the 21st of November, with almost
15,000 samples. In second place is Trojan.Symmi.47633, with 124,000 files spread over 64 days ― its best
day was on the 4th of December. Without a doubt, the most distributed trojan family is Trojan.Kazy.290327:
in 92 days we counted nearly a 141,000 new samples.
Page 15 of 28
Malware Trend Report
Quarter 4, 2014
3.6. Worms
In roughly 1.8 million new files we identified worm traces and functionalities. The first spike above 50,000,
on the 12th of November, was primarily caused by 44,000 samples of Worm.Generic.514468. On the 24th
and the 25th of November, 25,000 and 26,000 minor variations of Win32.Worm.Benjamin.A were counted.
Figure 13: Amount of Identified Worms Q3
The top 3 most identified Worm families include:
Total
Amount
First Seen
Last
Seen
Best Day
Amount
Best Day
Days
Seen
Worm.Generic.514468
155,962
01-10-14
31-12-14
12-11-14
43,566
90
Win32.Worm.P2p.Picsys.C
113,243
01-10-14
31-12-14
06-12-14
21,478
91
Win32.Worm.Benjamin.A
96,083
01-10-14
30-12-14
25-11-14
25,622
65
AV-Identifier
Table 3: Top 3 Worm Families Q4 2014
Compared with the third quarter, a slight decrease in worm usage can be seen. In the third quarter 7.97
percent were worms. For the fourth quarter 7.63 percent of the total was classified as worm.
Page 16 of 28
Malware Trend Report
Quarter 4, 2014
3.7. 64-bit Malware
Malware designed to run on Windows 64-bit was identified in 205,000 new malicious files in the fourth
quarter - a gigantic increase when compared with the 33,000 of the third quarter. From all new files, 0.89
percent was able to infect 64-bit Windows files.
Figure 14: Amount of Identified 64-Bit Malware Q4
Expiro ―designed to infect 32-bit and 64-bit files― aims to maximise profit and infects executable files on
local, removable and network drives. As for the payload, this malware installs extensions for the Google
Chrome and Mozilla Firefox browsers. The malware also steals stored certificates and passwords from
Internet Explorer, Microsoft Outlook and from the FTP client FileZilla. Browser extensions are used to
redirect the user to a malicious URL as well as to hijack confidential information, such as account
credentials or online banking information. The virus disables some services on the compromised computer,
including Windows Defender and Windows Security Center, and can also terminate processes.
In the third quarter a drop in the old Expiro usage and the rise of the second and third generation was seen.
The Expiro third generation variations were seen three times more than the second generation in the fourth
quarter.
In figure 18 we can see the seven 64-bit families we intercepted and the amount of files which were infected
by them.
Page 17 of 28
Malware Trend Report
Quarter 4, 2014
Figure 15: 64-bit Malware Families Q4
3.8. Malicious Others
After the adware, B&Bs, exploits, rootkits, worms, and the 64-bit malware, we are still left with 6.4 million
identified malicious files. This is 28 percent of the total of this quarter and a decrease of 7.7 percent
compared with the third quarter.
Figure 16: Other Malware Q4
Page 18 of 28
Malware Trend Report
Quarter 4, 2014
In table 4, we divided the others over 10 categories.
Q4
Category
Count
% of total
Q3
+/-
Count
% of total
+/-
DOS based
5,162
0.027 %
+0.018 %
2,070
0.009 %
-0.089 %
Encrypted Malware
9,093
0.048 %
+0.002 %
10,361
0.046 %
-0.011 %
4.018,331
21.031 %
+2.988 %
4,083,268
18.043 %
+3.660 %
7,303
0.038 %
-0.004 %
9,530
0.042 %
-0.024 %
Malware Heuristic
465,868
2.438 %
+1.760 %
153,411
0.678 %
-0.355 %
PUPs
768,098
4.020 %
-5.207 %
2,088,143
9.227 %
+0.456 %
72
0.000 %
-0.001 %
138
0.001 %
0.000 %
149,338
0.782 %
+0.507 %
62,181
0.275 %
+0.071 %
5,256
0.028 %
+0.013 %
3,448
0.015 %
-0.062 %
909
0.005 %
-0.007 %
2,784
0.012 %
-0.012 %
5,430,428
28.421 %
+0.072 %
6,415,335
28.349 %
+3.633 %
Generic Malware
Macro based
Riskware
Suspicious
(Hack)Tools
Windows viruses
Total
Table 4: Other Malware Q4 vs. Q3
% of total:
+/-:
Windows viruses:
The percentage of the category of all the malicious files processed in that quarter.
Increase/decrease in percentage compared with the quarter before.
These are so called classic viruses for Microsoft Windows, true file infectors.
Using generic malware detection we found Ramnit.N leftovers and infections in 1.1 million files.
Ramnit.N spreads by infecting EXE, DLL, and HTML files; it can also be distributed via removable drives.
Once active, the virus infects EXE, DLL and HTML files found on the computer. It will also drop a malicious
file that attempts to connect to and download other files from a remote server.
Page 19 of 28
Malware Trend Report
Quarter 4, 2014
4. Geolocation
Last quarter, we located RAT hotspots by plotting the servers with the most traffic and connections on a
map. RATs are short for Remote Administration Trojans or Remote Access Trojans (sometimes described
as Remote Access Tools1). This quarter we look at GoSmartVPS. According to their own website;
GoSmartVPS provides cheap and affordable high quality virtual private servers.
“We're excited to start offering virtual private servers for as low as $7/mo. With no long term contracts
and a 72 hour cancellation policy, there's no risk to try out GoSmartVPS!”.
This VPS (Virtual Private Server) network seems to host only botnet controllers (range 104.192.103.0/24):
104.192.103.10/32
104.192.103.20/32
104.192.103.21/32
104.192.103.22/32
104.192.103.28/32
104.192.103.29/32
104.192.103.4/32
104.192.103.41/32
104.192.103.45/32
104.192.103.5/32
104.192.103.72/32
104.192.103.8/32
104.192.103.80/32
104.192.103.9/32
104.192.103.91/32
104.192.103.92/32
104.192.103.94/32
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
controller
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
no
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Zeus Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Zeus Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
RSMIT-NLS - Citadel Botnet Controller
GoSmartVPS 104.192.103.0/24 - DNS Registrations: http://bgp.he.net/net/104.192.103.0/24#_dns
104.192.103.7 ns1.fireballs.asia, ns2.fireballs.asia
104.192.103.9
aaaaaaaaaaaaaaaaaaaazzzzzzzzzzzzzzzzzzzzzzbbbbbbbbbbbb.net
104.192.103.50 gosmartvps.com
104.192.103.71 onetapgaming.net
Domain Name: GOSMARTVPS.COM
Registrar: ENOM, INC.
Sponsoring Registrar IANA ID: 48
Whois Server: whois.enom.com
Referral URL: http://www.enom.com
Name Server: NS-1370.AWSDNS-43.ORG
Name Server: NS-153.AWSDNS-19.COM
Name Server: NS-1590.AWSDNS-06.CO.UK
Name Server: NS-975.AWSDNS-57.NET
Status: clientTransferProhibited
1
These are not regular administrator tools, but ones which are developed and used for malicious remote access.
Page 20 of 28
Malware Trend Report
Quarter 4, 2014
Updated Date: 17-sep-2014
Creation Date: 20-jul-2014
Expiration Date: 20-jul-2015
Website: https://www.gosmartvps.com/
At the moment GoSmartVPS seems to be down. But daily we see new Citadel Botnet Controllers added to
the network daily.
Top 10 Countries Hosting C&C
July
United States
August
1,491
United States
September
1,163
United States
870
Russian Federation
521
Russian Federation
529
Russian Federation
446
Germany
315
Germany
318
Germany
260
United Kingdom
311
United Kingdom
302
United Kingdom
259
Netherlands
225
Netherlands
208
Netherlands
156
China
216
Ukraine
202
China
152
Ukraine
160
China
196
Turkey
146
Korea
132
Turkey
154
Ukraine
130
France
129
Korea
137
Korea
102
Turkey
129
France
132
France
101
Table 5: Top 10 Countries Hosting C&C Servers Q3
In the third quarter the United States still led the pack, followed by the Russian Federation and Germany:
Top 10 Countries Hosting C&C
October
November
December
United States
841
United States
898
United States
723
Russian Federation
471
Russian Federation
470
Russian Federation
513
Germany
282
United Kingdom
261
Germany
260
United Kingdom
265
Germany
247
United Kingdom
242
Netherlands
159
Netherlands
167
Netherlands
202
Turkey
142
China
146
Ukraine
163
Ukraine
140
Ukraine
143
China
144
China
139
Brazil
116
France
131
Brazil
128
France
113
India
113
France
115
Korea
94
Brazil
110
Table 6: Top 10 Countries Hosting C&C Servers Q4
The C&C Servers hosted in The Netherlands increased slightly during the last quarter. New on the list are
C&C Servers hosted in India and Brazil. In total 11,642 active C&C servers were found and added to our
blacklist (4,050 in October, 3,875 November, and 3,717 in December).
And last but not least, below are some backdoors we found on North Korean IP’s (all 1024 IP’s):
Page 21 of 28
Malware Trend Report
Quarter 4, 2014
http://totalhash.com/analysis/073725e127fb502e3f54934945346267baf4c6bd
IP : 175.45.176.1/32 (Past: 183.207.184.195/32, 59.181.114.31/32)
Port : 7070/TCP
Domain : hxxp://fgwegasgxcxb.ddns.net
Totalhash :
http://totalhash.com/analysis/cd353c72769a014eb41bd93befd614239ca9bb3c
Detection : Dynamer, ServStart, Vehidis
inetnum: 175.45.176.0 - 175.45.179.255
netname: STAR-KP
descr: Ryugyong-dong
descr: Potong-gang District
country: KP
175.45.176.0/24
175.45.177.0/24
175.45.178.0/24
175.45.179.0/24
badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea)
badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea)
badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea)
badhood – no - RSMIT-NLS - Known Hostile Network – Ryugyong-dong (North Korea)
Page 22 of 28
Malware Trend Report
Quarter 4, 2014
5. Final Word
In the third quarter of 2014, the total number of new malicious files processed was 21.6 million. For the
fourth quarter it was 23.2 million ― an increase of 2.4 percent.
The overall detection by Anti-Virus software improved by 3.32 percent compared with the third quarter.
Altogether, around 4.4 million malicious files went undetected during the fourth quarter.
By grouping and classifying the identified malware, we detected a decrease of popularity in 3 of the 7 main
malware categories during the third quarter. These three categories are: rootkits, worms and others. The
remaining four categories (adware, B&B, exploits, and trojans) increased.
Category
Adware
Backdoors & Bots
Exploits
Rootkits
Total
% of
Total
+/- compared to
Q3
4,326,069
18.669 %
+4.008 %
Adware.Linkury.M
361,707
396,885
1.713 %
+0.436 %
Backdoor.Bot.158614
165,197
14,431
0.062 %
+0.031 %
Exploit:W32/CVE-2010-0188.C
Largest Family
Total number
Q4
7,014
9,759
0.042 %
-0.015 %
OnLineGames.1
Trojans
9,951,148
42.944%
+3.988 %
Gen:Variant.Kazy.290327
171,419
924
Worms
1,767,901
7.629 %
-0.343 %
Worm.Generic.514468
174,784
Others
6,706,193
28.940 %
-7.706 %
Win32.Ramnit.N
1,117,874
Table 7: Malware Categories Q3 vs. Q4
Within the top 10 countries hosting C&C servers, there was little change. The top 3 countries stayed the
same during the fourth quarter. United States led the third quarter of 2014, followed by the Russian
Federation. Germany and the United Kingdom switched places three and four. The Netherlands kept the 5th
place in the fourth quarter.
5.1. Miscreants say "Je suis Charlie" too
With thanks to Ashwin K. Vamshi from Blue Coat2:
January 14, 2015
It is very common for malicious actors to attempt to exploit trending news in order to lure users to execute
malicious programs. As a regular practice we keep track of such instances. In the most recent case I
happened to come across an interesting malware (md5 hash 3c5266cab10c78f3a49985806c217a40) with
the theme "Je Suis Charlie", a slogan that has gone viral after the 7 January 2015 massacre at the Charlie
Hebdo offices in Paris. This malware was found in our stream of incoming material so we don't yet know
how it has been distributed. It is likely, given the subject, that it has been attempted to be spread using
some kind of social engineering trick.
The malware in question is the infamous DarkComet RAT, a freely available remote administration tool
which also can double as a powerful backdoor trojan. DarkComet was originally developed by the French
hacker DarkCoderSc, who stopped further development on the project in 2012. Nevertheless, its ease of
2
https://www.bluecoat.com/security-blog/2015-01-14/miscreants-say-je-suis-charlie-too
Page 23 of 28
Malware Trend Report
Quarter 4, 2014
use and rich set of features have kept it popular by all sorts of attackers – from script kiddies and activists to
more sinister players.
The variant used in the present attack is obfuscated to
make it less noticed by AV scanners. The DarkComet Delphi
code is enveloped in a .NET wrapper, making the telltale
signs of DarkComet hard to spot. Indeed, the AV detection
rate of this executable is at the time of writing poor – only
2/53 scanners had detection on the VirusTotal online
scanner service.
The sample drops a copy of itself with the name
svchost.exe and launches an image of a new-born baby
with a band carrying the name “Je suis Charlie”. This image
appears to have been harvested from public sources.
Figure 17: Je Suis Charlie
The sample also displays a message in French to mislead the
user to believe that the binary is created a previous version of MovieMaker:
Figure 18: Fake Movie Maker Message
The Command and Control host is a subdomain under the no-ip dynamic DNS domain. This is a well-known
legitimate dynamic DNS service which is however often used by malicious actors.
The actual domain address is: snakes63.no-ip.org
This address currently resolves to an IP address located with the French service provider Orange. The
French IP address and the error message in French reinforces the impression that this malware was
targeted at French users, though we have no indication as to who the attackers are or what they are after.
The French authorities have been informed about this malware. We will continue to monitor activities in
this space and keep you posted. For now, just be alert that items of great media interest like this may
contain malware. There really is nothing so sacred that bad people won’t try to exploit it.
We hope you that you enjoyed our last Malware Trend Report of 2014 and that it provides you with insight
into the trends we have seen during the fourth quarter of 2014. We continue to innovate, so please check
back with us for our next quarterly trend report.
Questions, comments and requests can be directed towards the RedSocks Malware Research Labs.
RedSocks B.V.
W: www.redsocks.nl
T: +31 (0) 55 36 61 396
E: [email protected]
G.J.Vroon
Anti-Malware Behavioural Researcher
Page 24 of 28
Malware Trend Report
Quarter 4, 2014
Appendix A: Detecting Malware
October
Day
Files/day
Detected
November
Undetected
Files/day
Detected
December
Undetected
Files/day
Detected
Undetected
1
221,937
200,528
21,408
236,090
206,643
29,448
244,116
164,287
79,829
2
168,499
161,146
7,354
201,200
164,018
37,182
184,865
115,627
69,238
3
361,909
338,775
23,134
213,385
136,869
76,516
332,940
249,940
83,000
4
153,901
137,034
16,867
205,116
177,877
27,239
246,356
217,720
28,636
5
124,380
109,983
14,398
271,873
218,853
53,020
176,054
139,133
36,921
6
301,671
250,114
51,557
239,222
188,029
51,193
264,365
230,824
33,541
7
258,230
216,171
42,059
316,480
264,800
51,680
251,041
188,247
62,794
8
228,246
185,867
42,379
297,104
242,714
54,389
210,009
152,055
57,954
9
239,393
204,431
34,961
291,190
240,353
50,837
272,098
257,446
14,651
10
277,362
228,366
48,996
246,214
201,994
44,220
208,351
181,309
27,042
11
259,950
211,244
48,707
354,297
277,742
76,554
244,919
171,534
73,385
12
306,124
247,136
58,988
341,688
320,380
21,308
266,031
102,453
163,578
13
207,723
175,397
32,327
310,112
276,394
33,718
257,518
196,878
60,640
14
276,737
230,297
46,440
263,443
234,911
28,531
256,524
148,015
108,509
15
299,877
260,408
39,469
284,533
241,486
43,047
278,860
106,409
172,451
16
263,683
232,631
31,052
289,192
240,825
48,367
227,842
178,681
49,161
17
224,200
184,926
39,274
262,500
242,366
20,134
221,496
167,886
53,610
18
161,020
120,651
40,369
310,643
234,577
76,066
274,758
211,455
63,303
19
177,721
145,891
31,830
293,911
272,024
21,888
212,262
157,201
55,061
20
311,035
231,104
79,931
309,302
222,826
86,476
308,861
243,483
65,378
21
249,389
220,454
28,935
269,771
251,213
18,558
258,537
186,288
72,249
22
276,690
253,374
23,316
222,693
190,708
31,984
268,484
199,313
69,171
23
216,372
207,158
9,214
382,913
289,522
93,391
252,430
170,555
81,876
24
248,500
223,505
24,996
220,827
198,747
22,080
269,492
194,215
75,278
25
150,332
128,447
21,885
318,781
246,505
72,276
188,857
135,065
53,793
26
177,292
159,228
18,063
207,452
197,750
9,702
203,579
164,761
38,818
27
194,929
166,240
28,689
206,615
179,730
26,885
275,716
195,061
80,655
28
188,917
163,458
25,459
280,991
228,548
52,443
261,654
184,278
77,376
29
221,939
199,706
22,234
290,104
254,482
35,622
433,501
390,679
42,822
30
250,993
233,906
17,087
212,383
183,670
28,713
215,112
150,613
64,499
221,742
154,493
67,249
8,150,022
6,826,555
1,323,467
7,788,369
5,705,903
2,082,467
31
235,042
207,665
27,377
7,233,995
6,235,241
971,377
Page 25 of 28
Malware Trend Report
Quarter 4, 2014
Appendix B: Classifying Malware
October
Day
Adware
Backdoors
Exploits
Rootkits
Trojans
Worms
Other
1
29,142
3,666
32
67
91,371
21,971
2
30,304
4,015
11
48
66,061
16,921
51,139
3
59,977
3,392
84
37
158,731
38,781
100,906
4
16,499
1,716
49
35
68,273
19,933
47,396
5
16,258
1,175
24
45
51,170
16,586
39,123
6
53,250
3,566
273
110
109,577
15,555
119,340
7
48,607
6,307
31
58
108,077
12,122
83,028
8
37,251
6,769
18
68
98,111
12,690
73,339
9
41,105
8,975
13
44
112,391
15,580
61,284
10
54,341
9,832
180
42
114,025
15,720
83,222
11
54,726
7,303
37
75
102,938
14,279
80,592
12
82,129
3,810
26
76
86,788
16,360
116,935
13
44,742
6,363
98
35
61,265
13,382
81,839
14
47,803
4,727
35
39
76,580
32,953
114,600
15
34,787
5,415
45
82
140,987
29,158
89,404
16
37,506
8,213
32
53
82,135
27,071
108,673
17
40,128
1,499
142
45
96,503
9,970
75,914
18
46,505
1,229
200
264
56,228
5,402
51,194
19
41,966
963
0
53
56,649
11,941
66,149
20
65,477
2,681
92
1,035
112,007
19,718
110,024
21
35,952
2,953
45
450
118,511
16,512
74,966
22
34,956
2,282
27
27
144,081
10,863
84,453
23
23,879
2,219
326
21
111,415
8,553
69,960
24
38,910
2,961
12
44
100,932
12,110
93,532
25
51,613
1,925
37
23
48,131
2,910
45,693
26
24,172
2,210
3
12
69,035
4,614
77,245
27
19,102
2,048
2
7
97,727
8,190
67,854
28
28,489
1,660
12
28
86,147
13,727
58,854
29
33,507
3,472
2
67
96,669
15,447
72,775
30
13,067
3,107
9
15
131,188
8,435
95,171
31
31,450
2,414
13
36
122,161
3,789
75,179
1,217,599
118,868
1,911
3,042
2,975,865
471,243
2,445,466
Total
75,685
Page 26 of 28
Malware Trend Report
Quarter 4, 2014
November
Day
Adware
Backdoors
Exploits
Rootkits
Trojans
Worms
Other
1
41,245
2,718
15
59
109,422
8,238
74,393
2
59,454
1,022
15
127
83,944
5,188
51,449
3
84,670
631
12
35
65,116
1,322
61,599
4
101,514
895
390
67
60,653
5,471
36,126
5
72,242
1,592
67
67
138,849
3,278
55,778
6
62,446
5,223
218
89
111,430
4,288
55,527
7
56,531
7,460
9
90
171,434
5,596
75,360
8
61,808
2,957
7
86
137,932
4,833
89,480
9
58,441
3,525
23
57
133,497
10,960
84,687
10
54,751
3,544
18
52
86,853
31,226
69,769
11
62,319
5,447
28
69
166,658
36,641
83,134
12
62,788
5,231
13
67
150,523
37,257
85,809
13
58,887
1,718
31
65
167,962
25,362
56,086
14
35,560
1,225
17
56
158,468
7,537
60,581
15
39,295
3,161
33
78
173,699
10,661
57,605
16
43,774
2,657
51
83
138,981
17,628
86,017
17
37,906
5,059
2,415
24
106,590
32,967
77,539
18
58,854
2,522
25
44
164,994
14,302
69,901
19
59,746
4,753
5
59
147,367
7,640
74,341
20
77,683
1,669
40
90
146,790
14,164
68,864
21
48,703
1,233
723
27
142,161
6,934
69,989
22
34,302
18,933
75
56
73,852
19,613
75,861
23
82,842
12,959
20
111
126,202
60,047
100,731
24
32,160
4,326
10
50
79,995
47,645
56,641
25
46,584
5,346
6
69
126,701
71,258
68,818
26
38,982
2,279
26
65
97,518
20,353
48,229
27
36,650
1,785
15
27
80,136
20,019
67,984
28
57,060
2,687
5
62
106,854
39,141
75,182
29
40,060
8,931
5
47
99,668
39,549
101,843
30
Totals
39,580
14,555
12
50
64,540
13,377
80,269
1,646,838
136,044
4,330
1,928
3,618,792
622,496
2,119,594
Page 27 of 28
Malware Trend Report
Quarter 4, 2014
December
Day
Adware
Backdoors
Exploits
Rootkits
Trojans
Worms
Other
1
39,265
18,815
7
54
92,313
14,661
2
28,897
9,442
7
22
65,362
15,609
65,525
3
35,607
1,880
37
164
141,543
35,908
117,801
4
25,775
1,208
30
65
144,917
19,731
54,629
5
23,194
1,490
517
34
66,620
22,771
61,430
6
45,800
2,748
20
101
94,756
47,126
73,814
7
41,206
5,541
0
55
87,010
32,907
84,322
8
45,462
2,861
4
48
70,705
23,010
67,919
9
55,710
5,694
86
142
101,928
27,473
81,064
10
37,945
4,554
174
106
83,780
22,715
59,075
11
25,175
4,559
386
650
126,473
30,280
57,396
12
37,504
4,729
324
123
126,558
41,199
55,595
13
39,202
9,316
474
68
120,159
42,448
45,852
14
36,162
11,512
2,103
79
104,305
41,233
61,131
15
44,627
5,781
1,219
160
137,880
37,848
51,345
16
21,624
5,478
634
70
121,225
32,882
45,929
17
26,407
9,218
432
84
92,989
23,183
69,183
18
67,248
5,536
536
80
100,682
18,232
82,444
19
46,051
4,819
360
86
64,168
12,577
84,200
20
40,203
5,984
184
630
142,592
13,407
105,860
21
45,744
1,425
132
46
100,397
13,382
97,411
22
33,292
1,442
43
43
119,016
22,089
92,560
23
47,187
2,370
45
416
102,963
19,049
80,402
24
32,876
2,243
52
406
147,316
14,884
71,715
25
32,356
1,827
36
317
106,349
4,669
43,303
26
60,059
2,060
110
184
94,786
4,591
41,790
27
48,119
1,852
42
84
112,986
9,451
103,182
28
74,095
1,776
30
184
100,224
5,910
79,435
29
227,926
2,910
56
172
183,228
10,820
8,390
30
46,262
1,484
16
62
105,311
6,928
55,048
31
Totals
79,000
50,651
1,420
95
50
97,952
7,187
64,386
1,461,631
141,973
8,191
4,788
3,356,490
674,163
2,141,133
Page 28 of 28
REDSOCKS
RedSocks is a Dutch company specialised in malware detection. RedSocks supplies RedSocks malware
threat defender as a network appliance. This innovative appliance analyses digital traffic flows in real
time based on the algorithms and lists of malicious indicators compiled by the RedSocks Malware
Intelligence Team. This team consists of specialists in identifying new threats on the internet and
translating them into state-of-the-art malware detection.
www.redsocks.eu
Laan van Nieuw-Oost Indië 133f, 2593 BM Den Haag
Tel +31 (0)88 13 33 333
E-mail [email protected]
Website www.redsocks.neu