{"id":9177,"date":"2019-08-23T02:29:59","date_gmt":"2019-08-23T02:29:59","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9177"},"modified":"2026-04-17T18:07:52","modified_gmt":"2026-04-17T18:07:52","slug":"banking-trojan-banjori-analysis-report","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/banking-trojan-banjori-analysis-report\/","title":{"rendered":"Banking Trojan Banjori Analysis Report"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong><a name=\"_Toc130115382\"><\/a><a name=\"_Toc6831706\"><\/a><a name=\"_Toc14876096\"><\/a>1 Sample Introduction<\/strong><\/h2>\n<p>Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in France, Germany, and the USA as major targets. After infecting a user, the trojan injects a malicious payload into the user&#8217;s active processes and collect the user&#8217;s information. Banking trojans and Banjori are mainly used to steal information via browsers.. Compared to Internet Explorer and Chrome, Firefox is a more sought after target for Banjori, which steals the majority of user information via query of hook and database files of the browser. It is worth noting that this family started to use the then modern dynamic domain generation algorithm (DGA) to obtain C&amp;C server addresses in 2013. This renders the traditional blacklist of antivirus software ineffective, but also creates conditions for destroying andtaking over the Banjori botnets.<!--more--><\/p>\n<p>NSFOCUS Security Labs have tracked this family for one year and detected a total of 1,499 related botnets. This number is still increasing each month.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9178\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"682\" height=\"367\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-1.jpg 682w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-1-300x161.jpg 300w\" sizes=\"(max-width: 682px) 100vw, 682px\" \/><\/a><\/p>\n<h2><strong><a name=\"_Toc14876097\"><\/a>2 Sample Execution Process<\/strong><\/h2>\n<p>The sample first drops malicious code onto the heap and then starts to infect other processes by means of injection. Malicious code injected works the same way, but with different types of behavior. This is due to the fact that different entry points are specified for the code. There are three such entry points, indicating three execution stages.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9179\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"501\" height=\"347\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-2.jpg 501w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-2-300x208.jpg 300w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/><\/a><\/p>\n<p><u>The first stage<\/u> takes place within the malicious process. Malicious code is first decompressed and dropped into its own heap space and then skips to the entry point for first-stage execution.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9180\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"632\" height=\"86\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-3.jpg 632w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-3-300x41.jpg 300w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/a><\/p>\n<p>At the first stage, the following tasks are fulfilled:<\/p>\n<ol>\n<li>Inject malicious code in the heap into all active processes.<\/li>\n<li>Hook the CloseHandle function of the injected processes.<\/li>\n<li>Set a flag bit for the injected processes to avoid repetitive injection. Replace the byte at offset 0x51 in the PE header of kernel32.dll loaded by an injected process with &#8220;@&#8221;. Then the DOS section of the PE header changes to &#8220;Th@s program cannot be run in DOS mode&#8221;.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9181\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"711\" height=\"664\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-4.jpg 711w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-4-300x280.jpg 300w\" sizes=\"(max-width: 711px) 100vw, 711px\" \/><\/a><\/p>\n<p><u>The second stage<\/u> takes place within the infected processes. After calling the CloseHandle function, the hook set at the first stage &#8220;jumps&#8221; to the entry point of the second stage.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9182\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-5.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"741\" height=\"141\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-5.jpg 741w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-5-300x57.jpg 300w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/a><\/p>\n<p>At the second stage, the following tasks are fulfilled:<\/p>\n<ol>\n<li>Continue to inject malicious code into all active processes for persistence.<\/li>\n<li>Create a puppet process svchost and inject malicious code into this process.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9183\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-6.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"632\" height=\"401\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-6.jpg 632w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-6-300x190.jpg 300w\" sizes=\"(max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><u>The third stage<\/u> takes place in the svchost process. Remote threads created at the second stage now come to the entry point of the third stage.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9184\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-7.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"765\" height=\"147\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-7.jpg 765w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-7-300x58.jpg 300w\" sizes=\"(max-width: 765px) 100vw, 765px\" \/><\/p>\n<p>At the third stage, the following tasks are fulfilled:<\/p>\n<ol>\n<li>Use DGA to dynamically obtain C2 domain names to bypass malicious name detection by antivirus software.<\/li>\n<li>Upload the stolen user information to the C2 server.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9185\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-8.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"683\" height=\"378\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-8.jpg 683w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-8-300x166.jpg 300w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/a><\/p>\n<h2><strong><a name=\"_Toc6831712\"><\/a><a name=\"_Toc14876098\"><\/a>3 Technical Details<\/strong><\/h2>\n<h3><strong><a name=\"_Toc14876099\"><\/a>3.1 Threat Persistence<\/strong><\/h3>\n<p>During the first and second stages, the sample cyclically checks whether the mutex JbrDelete has been created, and if not, will continue to discover active processes and inject malicious code into these processes.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9186\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-9.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"712\" height=\"327\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-9.jpg 712w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-9-300x138.jpg 300w\" sizes=\"(max-width: 712px) 100vw, 712px\" \/><\/a><\/p>\n<p>During the second stage, malicious code creates a hidden window. The message callback function of this window is responsible for creating the mutex JbrDelete, after which the cyclic check will stop. This mutex is created if, and only if, the window receives a user logout message &#8220;WM_QUERYENDSESSION&#8221;.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9187\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-10.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"742\" height=\"122\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-10.jpg 742w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-10-300x49.jpg 300w\" sizes=\"(max-width: 742px) 100vw, 742px\" \/><\/a><\/p>\n<h3><strong><a name=\"_Toc14876100\"><\/a>3.2 Information Theft<\/strong><\/h3>\n<p>Malicious code injected in active processes during the second stage is responsible for stealing information. First, the malicious code checks the language of the operating system and, if and only if the language is English, will search <strong>\\Users\\%UserName%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\<\/strong> for sensitive files that contain bank names and copy them into a to-be-uploaded folder.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9188\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-11.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"818\" height=\"99\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-11.jpg 818w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-11-300x36.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-11-768x93.jpg 768w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/a><\/p>\n<p>When the language is German, French, or English, the injected malicious code will attempt to hunt sqlite3.dll (not a component of Firefox of new versions) in the root directory of Firefox, and use the export function of this DLL to query cached files of Firefox and save the query result to a local disk drive.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9189\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-12.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"818\" height=\"102\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-12.jpg 818w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-12-300x37.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-12-768x96.jpg 768w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/a><\/p>\n<p>The sample records all domains visited by zombies no matter what language their operating systems are using. The malicious code injected in processes checks whether it is within the process space of Firefox and, if so, will attempt to identify ssl3.dll from all DLLs loaded by Firefox and hook its export function SSL_SetURL. It should be noted that the network security service (NSS) library of earlier Firefox contained ssl3.dll, which was later renamed nss3.dll in a version iteration.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9190\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-13.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"746\" height=\"333\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-13.jpg 746w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-13-300x134.jpg 300w\" sizes=\"(max-width: 746px) 100vw, 746px\" \/><\/a><\/p>\n<p>The hook function extracts domains visited by users from parameters and saves them to a local disk drive for subsequent uploading.<\/p>\n<h3><strong><a name=\"_Toc14876101\"><\/a>3.3 Dynamic Domain Generation Algorithm<\/strong><\/h3>\n<p>The sample uses the string &#8220;antisemitismgavenuteq.com&#8221; as the seed domain and obtains actual C2 domains upon computation of the first four characters. For the detailed computation process, see the following equations:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9191\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-14.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"780\" height=\"141\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-14.jpg 780w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-14-300x54.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-14-768x139.jpg 768w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/a><\/p>\n<p>The C2 domains obtained by using the DGA algorithm are different from the seed domain in only the first four characters. All together there are 26^4 combinations. The following are some examples of the generated C2 domains:<\/p>\n<p><em>&acirc;&euro;&trade;<strong>plhu<\/strong>semitismgavenuteq.com&acirc;&euro;&trade;<\/em><\/p>\n<p><em>&acirc;&euro;&tilde;<strong>ckbr<\/strong>semitismgavenuteq.com&acirc;&euro;&trade;<\/em><\/p>\n<p><em>&acirc;&euro;&tilde;<strong>msfa<\/strong>semitismgavenuteq.com&acirc;&euro;&trade;<\/em><\/p>\n<p><em>&acirc;&euro;&tilde;<strong>fbcp<\/strong>semitismgavenuteq.com&acirc;&euro;&trade;<\/em><\/p>\n<p>The sample will keep using this algorithm to generate new C2 domains until it successfully connects to a domain generated this way. As the number of four-character combinations is limited, the algorithm will repeatedly generate the same domains, that is, loopback domains. For example, when &#8220;antisemitismgavenuteq.com&#8221; is the seed domain, the second and the 15374th C2 domains are both &#8220;nzrvsemitismgavenuteq.com&#8221;.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9192\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-15.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"570\" height=\"503\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-15.jpg 570w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-15-300x265.jpg 300w\" sizes=\"(max-width: 570px) 100vw, 570px\" \/><\/a><\/p>\n<p>Some domains are regenerated after a few rounds, but some are not. For example, for the domain &#8220;<strong>gfaq<\/strong>semitismgavenuteq.com&#8221;, there is no input corresponding to &#8220;<strong>gfaq<\/strong>&#8221; obtained by using the DGA algorithm. A non-loopback domain can be used as the seed of the DGA algorithm, but cannot be used as a C2 domain. This is because this type of domain cannot be regenerated. The fact that the first connection fails indicates that C2 permanently loses control over the zombie. We can extract signatures of loopback domains and then typosquat them before taking over this botnet.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-16.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9193\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-16.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"442\" height=\"82\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-16.jpg 442w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-16-300x56.jpg 300w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/a><\/p>\n<p>Similarly,<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-17.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9194\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-17.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"602\" height=\"172\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-17.jpg 602w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-17-300x86.jpg 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p>If the first four characters <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-18.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9195\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-18.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"133\" height=\"27\"><\/a>&Acirc;&nbsp;are part of a loopback domain, there must be four characters&Acirc;&nbsp;<a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-19.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9196\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-19.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"95\" height=\"28\"><\/a> &Acirc;&nbsp;that generated them. Furthermore, if&Acirc;&nbsp; <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-20.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9197\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-20.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"133\" height=\"28\"><\/a>&Acirc;&nbsp;are part of a loopback domain, the first two bytes&Acirc;&nbsp;<a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-21.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9198\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-21.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"28\"><\/a> &Acirc;&nbsp;must have a corresponding pair of&Acirc;&nbsp; <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-22.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9199\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-22.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"53\" height=\"28\"><\/a>.<\/p>\n<p>When adding <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-23.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9200\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-23.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"28\"><\/a>, we get:<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-24.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9201\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-24.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"499\" height=\"141\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-24.jpg 499w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-24-300x85.jpg 300w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/a><\/p>\n<p>It is evident that when&Acirc;&nbsp;<a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-25.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9202\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-25.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"28\"><\/a> &Acirc;&nbsp;and&Acirc;&nbsp; <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-26.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9203\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-26.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"53\" height=\"28\"><\/a>&Acirc;&nbsp;both exist, the sum of&Acirc;&nbsp; <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-27.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9204\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-27.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"28\"><\/a>&Acirc;&nbsp; can be divided by exactly 2. In other words, when <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-28.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9205\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-28.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"28\"><\/a>&Acirc;&nbsp;have the same parity,&Acirc;&nbsp; <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-29.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9206\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-29.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"133\" height=\"28\"><\/a>&Acirc;&nbsp;is the necessary and inadequate condition of generating loopback addresses. In contrast, when the parity of <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-30.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9207\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-30.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"80\" height=\"28\"><\/a>&Acirc;&nbsp;is different,&Acirc;&nbsp;<a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-31.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9208\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-31.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"133\" height=\"28\"><\/a> &Acirc;&nbsp;cannot be a loopback address. Non-loopback addresses account for <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-32.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9209\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-32.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"147\" height=\"47\"><\/a>&Acirc;&nbsp;of the total addresses, that is [0.25, 0.5].<\/p>\n<p>To sum up, with non-loopback domains, whose <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-33.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9210\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-33.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"70\" height=\"27\"><\/a>&Acirc;&nbsp;can be &Acirc;&nbsp;divided by exactly 2, however, attackers can still take over the botnet by typosquatting 75% or less of loopback domains.<\/p>\n<h3><strong><a name=\"_Toc14876102\"><\/a>3.4 Communication Protocols<\/strong><\/h3>\n<p>During the third stage, malicious code in the puppet process scvhost is responsible for communicating with the C2 server. The sample generates two pipelines: One uses HTTP to notify C2 of the sample&#8217;s running status, and the other uses XMPP to upload user information. stolen at the second stage.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-34.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9211\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-34.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"664\" height=\"359\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-34.jpg 664w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-34-300x162.jpg 300w\" sizes=\"(max-width: 664px) 100vw, 664px\" \/><\/a><\/p>\n<p>The message format used by pipeline 1 contains the following fields, which can be extracted to deduce traffic patterns:<\/p>\n<p><em>{<\/em><\/p>\n<p><em>&amp;q=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;data=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;data_type=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;action=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;ver=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;ch=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;data_content=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&#8216;0xA&#8217;task&#8217;0xA&#8217;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Optional<\/em><\/p>\n<p><em>&amp;id=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Hardcoded<\/em><\/p>\n<p><em>&amp;versionf=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Hardcoded<\/em><\/p>\n<p><em>&amp;versiona=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Hardcoded<\/em><\/p>\n<p><em>&amp;vendor=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Hardcoded<\/em><\/p>\n<p><em>&amp;do=&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/Encoded C2 domain<\/em><\/p>\n<p><em>&amp;check=chek&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp;&Acirc;&nbsp; \/\/ Hardcoded<\/em><\/p>\n<p><em>}<\/em><\/p>\n<p>The sample uses pipeline 1 to conduct the first interaction with the C2 server. The <strong>action<\/strong> field of the message is set to <strong>new<\/strong>.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-35.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9212\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-35.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"935\" height=\"145\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-35.jpg 935w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-35-300x47.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-35-768x119.jpg 768w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/a><\/p>\n<p>The sample uses pipeline 2 to upload various files that contain user information.<\/p>\n<p>First, the sample traverses the directory of to-be-uploaded files.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-36.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9213\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-36.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"646\" height=\"399\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-36.jpg 646w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-36-300x185.jpg 300w\" sizes=\"(max-width: 646px) 100vw, 646px\" \/><\/a><\/p>\n<p>Next, the sample crafts a packet that contains basic information of the uploaded file and sends it to the C2 server. Before sending the packet, the sample adds the PGP header, but &Acirc;&nbsp;encodes the payload with Base64 only without encrypting it as per requirements of the PGP protocol.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-37.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9214\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-37.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"683\" height=\"130\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-37.jpg 683w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/08\/0823-37-300x57.jpg 300w\" sizes=\"(max-width: 683px) 100vw, 683px\" \/><\/a><\/p>\n<p>Finally, the sample uploads files in the directory one by one.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong><a name=\"_Toc14876103\"><\/a><a name=\"_Toc6831718\"><\/a>4 Indicators of Compromise<\/strong><\/h2>\n<table width=\"529\">\n<thead>\n<tr>\n<td width=\"209\">Seed Domain<\/td>\n<td width=\"304\">MD5<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"209\">antisemitismgavenuteq.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/d1f5399d7287dcf611fa00545bfeab0c751bb8908fe6127eb25c3c4553a15d9e\/analysis\/\">538da019729597b176e5495aa5412e83<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">bandepictom.com<\/td>\n<td width=\"304\"><a href=\"http:\/\/www.threatexpert.com\/report.aspx?md5=5592456e82f60d2222c9f2bce5444de5\">5592456E82F60D2222C9F2BCE5444DE5<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">buckbyplaywobb.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/6cddb4e1fef2dfe33b7d727bb22462644742cfeeecf1f6a5172cf3e33e0af17e\/analysis\/\">f9d02df23531cff89b0d054b30f98421<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">telemachuslazaroqok.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/9baa43815bfa3f94deebb3c7dfa6007fab6773e9431539b18e2f5bc511d4e0de\/analysis\/\">bc69a956b147c99f6d316f8cea435915<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">texanfoulilp.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/8dc6984d03fcae455a6f5b752bf9f531fd2a35b8869582df7b2134c9a61d3d83\/analysis\/\">36a9c28031d07b82973f7c9eec3b995c<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">clearasildeafeninguvuc.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/351cdd42c03bf4b9ec751215fc69facc4da2b8a72714eaba43f66da55024e492\/analysis\/\">1e081e503668347c81bbba7642bef609<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">marisagabardinedazyx.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/ce2f1c7de4fe6d636ef116e979ef061634ff19227dfe3e4ec0589ae0b3f08f50\/analysis\/\">c2c980ea81547c4b8de34adf829ccc26<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">pickfordlinnetavox.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/b7826387629346725b9ede334da9480216b7a9e5a43a76a295c1369b24e00baa\/analysis\/\">4e76a7ba69d1b6891db95add7b29225e<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">snapplefrostbitecycz.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/a01642c4caa975992d0a248d23d131797025752e5edabafe90fd134be909bdb1\/analysis\/\">abb80f23028c49d753e7c93a801444d8<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">filtererwyatanb.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/caf8d2ebf966d931c49f7d58a68583e46642e0eb7492638b7ca8ca2bc6c4618d\/analysis\/\">eff48dae5e91845c2414f0a4f91a1518<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">antwancorml.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/malwr.com\/analysis\/OWE1ZjUyY2ExZjZhNGQ3NTkwNjIzZmY2MGIwZTU5MjI\/\">5dda3983ac7cebd3190942ee47a13e50<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">stravinskycattederifg.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/49bc11789c7a5696b8f36a46a0d26b1a08f896a7eaa443d5c5dcd01787fdf7ae\/analysis\/\">eaeb5a9d8d955831c443d4a6f9e179fd<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">forepartbulkyf.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/da12deec541bf20c83718b9a3121b13ef221c60f33c05c4922fb664fc6d13764\/analysis\/\">080b3f46356493aeb7ec38e30acbe4f5<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">fundamentalistfanchonut.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/api.vtapi.net\/da\/file\/43c3f32ff9e20e39b807db81986df238e2aca81205bdcef216f22ea30526e06e\/analysis\/\">40827866594cc26f12bda252939141f6<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">criterionirkutskagl.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/c252a640a8624ae2ce6f521629b92b2aec5c1953864d44a949229a08b09b2937\/analysis\/\">8e1d326b687fc4aacc6914e16652c288<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">criminalcentricem.com<\/td>\n<td width=\"304\"><a href=\"http:\/\/totalhash.com\/analysis\/ed22d9bb5c12ab04fa212f8deda943553f4da83c\">a03971bff15ec6782ae25182f4533b92<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">babysatformalisticirekb.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/www.virustotal.com\/de\/file\/ac8b1b6fb5e48b0d2c7edd2a4afa3494bf94269c8e7a855b7935627f212e3570\/analysis\/\">b9fb8ae5e3985980175e74cf5deaa6fb<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"209\">earnestnessbiophysicalohax.com<\/td>\n<td width=\"304\"><a href=\"https:\/\/malwr.com\/analysis\/OTU2ZGNiM2JmMzk1NDQ4MmE2ZDNmMzE4NTdmMjAwNDY\/\">f555132e0b7984318b965f984785d360<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><strong><a name=\"_Toc6831722\"><\/a><a name=\"_Toc14876104\"><\/a>References<\/strong><\/h2>\n<p><a href=\"https:\/\/www.johannesbader.ch\/2015\/02\/the-dga-of-banjori\/\">https:\/\/www.johannesbader.ch\/2015\/02\/the-dga-of-banjori\/<\/a><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 Sample Introduction Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in France, Germany, and the USA as major targets. After infecting a user, the trojan injects a malicious payload into the user&#8217;s active processes and collect the user&#8217;s information. Banking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8765,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[67],"class_list":["post-9177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-analysis-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Banking Trojan Banjori Analysis Report - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Banking Trojan Banjori Analysis Report - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"1 Sample Introduction Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T02:29:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Banking Trojan Banjori Analysis Report - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"1 Sample Introduction Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Banking Trojan Banjori Analysis Report\",\"datePublished\":\"2019-08-23T02:29:59+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/\"},\"wordCount\":1987,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"keywords\":[\"Analysis Report\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/\",\"name\":\"Banking Trojan Banjori Analysis Report - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"datePublished\":\"2019-08-23T02:29:59+00:00\",\"dateModified\":\"2026-04-17T18:07:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/1108-1.jpg\",\"width\":595,\"height\":374,\"caption\":\"Hacker with digital dollar symbol overlay.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/banking-trojan-banjori-analysis-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking Trojan Banjori Analysis Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Banking Trojan Banjori Analysis Report - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Banking Trojan Banjori Analysis Report - NSFOCUS","og_description":"1 Sample Introduction Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in","og_url":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/","og_site_name":"NSFOCUS","article_published_time":"2019-08-23T02:29:59+00:00","article_modified_time":"2026-04-17T18:07:52+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Banking Trojan Banjori Analysis Report - NSFOCUS","twitter_description":"1 Sample Introduction Banjori is a banking trojan that has been active since it was first spotted in 2013. It identifies personal online banking users in","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"10 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Banking Trojan Banjori Analysis Report","datePublished":"2019-08-23T02:29:59+00:00","dateModified":"2026-04-17T18:07:52+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/"},"wordCount":1987,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","keywords":["Analysis Report"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/","url":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/","name":"Banking Trojan Banjori Analysis Report - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","datePublished":"2019-08-23T02:29:59+00:00","dateModified":"2026-04-17T18:07:52+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/05\/1108-1.jpg","width":595,"height":374,"caption":"Hacker with digital dollar symbol overlay."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/banking-trojan-banjori-analysis-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Banking Trojan Banjori Analysis Report"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9177"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9177\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8765"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}