English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Brazilian bankers gone wild: now using malicious Office files

Fabio Assolini
Kaspersky Lab Expert
Posted November 05, 03:33  GMT
Tags: Social Engineering, Microsoft Word, Malware Creators
Dmitry Bestuzhev
Kaspersky Lab Expert
Posted November 05, 03:33  GMT
Tags: Social Engineering, Microsoft Word, Malware Creators
0.5
 

New trick from cybercriminals of Brazil - a suspicious message arrives to the user with a file attached named "Comprovante_Internet_Banking.rtf", translated from Portuguese it means "Receipt from Internet Banking":

Are you waiting a banking receipt via email?

If the user were to open the file it would be presented with the image of a bank receipt and the invitation to double click on it (the text below says "Click to see in a larger size", "To display the banking receipt click twice in the image")

When clicking on the embedded object the the user will be asked to execute it starting the infection process by running a CPL file

The .RTF file format and some text editors allow the insertion of file objects inside documents, interestingly even an executable file can be embedded:

The .RTF file has 2 blocks of binary data:
object size 223753 at index 000000D5
object size 15744 at index 00070215
One of them which reveals the path used by the bad guy to create the image, revealing ownership of an Acer Aspire-4520 computer:

The .CPL file (MD5: 563707b4edcc0bb0c88365a6702d4ba0) embedded into the RTF file is a well-known Brazilian Trojan banker, written in Delphi, belonging to the family Trojan.Win32.ChePro - after executed it drops several files through the system to keep the infection running. Embedding malicious files into RTF or DOC files allows cybercriminals to bypass e-mail filtering by extensions or type; also it allows them to break the AV detection by signatures.
We are sure that we-ll see this technique being exploited in Brazil more times from now on.


Comments

If you would like to comment on this article you must first
login


Bookmark and Share
Share

Analysis

Blog