DNSMessenger Trojan is using DNS queries for its orders

[German]Security researchers has discovered a new file less malware that comes as a PowerShell script and uses DNS queries to receive its orders.


Advertising

The malware was discovered from researcher of Cisco`s Talos project and has been documented here. The infection starts with a phishing campain, where  an e-mail has been send to many users. The e-mail contains a Word attachment, claiming to be protected by Mc Afee.


(Source: Cisco/Talos)

If the user clicks the link, a PowerShell script will be executed and loads the Trojan into memory. Then it checks the scripts environment (if the user has admin rights) and loads a 2nd PowerShell script. This script will be stored within Alternate Data Stream (ADS) of the NTFS file system or within the registry.

A third PowerShell script establishes a communication channel using DNS records to send data and receiving commands from a C&C server. Further details may be found within this blog post. (via)


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security, Windows and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *