Dear all

This is Upatre downloading Dyre, a banking trojan. The Dyre here is part
of a campaign "UK21" targeting several hundred banks worldwide.


Upatre is a specialized downloader, bypassing all AV engines around for
a couple of hours. It does download Dyre and shows a decoy pdf to the
user. After AV catches up, Upatre will change its structure to bypass
detection again. So, what can you do? Blocking some file extensions of
email attachment at the perimeter, however, this can easily circumvented
by the adversaries, and, of course, build user awareness.

On the network side, blocking outgoing SMTP (also a good measure to
detect infected client machines) and spam filtering outgoing mails on
your MTAs may be effective measures.

Kind regards,
Slavo


On 16.04.15 17:07, Mike Kellenberger wrote:
> Thanks for the tip, Steven.
> 
> https://www.virustotal.com/en/file/6159e15c7a5401ba8e7708755b75ce5bb911cb1dbe15253c13a06b4c0f35e5e3/analysis/1429196664/
> 
> 
> Kaspersky should detect it now - time to force a definition update...
> 
> Regards,
> 
> Mike
> 


-- 
SWITCH
Slavo Greminger, SWITCH-CERT
Werdstrasse 2, P.O. Box, 8021 Zurich, Switzerland
phone +41 44 268 15 15, direct +41 44 268 15 45
slavo.gremin...@switch.ch, http://www.switch.ch

Security-Blog: http://securityblog.switch.ch


_______________________________________________
swinog mailing list
swinog@lists.swinog.ch
http://lists.swinog.ch/cgi-bin/mailman/listinfo/swinog

Reply via email to