CIS Logo
tagline: Confidence in the Connected World

Top 10 Malware November 2019

The composition of the Top 10 Malware in November saw both Emotet and TrickBot fall out of the Top 10. Overall, the Top 10 Malware variants comprised 57% of Total Malware activity in November, indicating the Top 10 Malware variants are driving the rate of malware infections for the month. Fewer Emotet and TrickBot infections led to a significant decrease in malware alerts for the month
Infection-vectors-nov-2019
MS-ISAC-Malware-Notifications-Nov-2019

The composition of the Top 10 Malware in November saw both Emotet and TrickBot fall out of the Top 10. Overall, the Top 10 Malware variants comprised 57% of Total Malware activity in November, indicating the Top 10 Malware variants are driving the rate of malware infections for the month. Fewer Emotet and TrickBot infections led to a significant decrease in malware alerts for the month.

In November 2019, malware utilizing the malspam initiation vector accounted for the greatest number of alerts in the Top 10 malware list. The decline in the multiple and malspam categories is attributed to fewer Emotet and TrickBot infections. ZeuS and TrickBot infections account for the rise in activity within the multiple infection vector category over the last several months. include Dridex, Kovter, NanoCore, and Cerber drive malspam related infections for the month of November.

Top-10-Malware-Nov-2019

Dropped – Malware delivered by other malware already on the system, an exploit kit, infected third-party software, or manually by a cyber threat actor. Currently Gh0st, Mirai, and Pushdo are being dropped.

Multiple – Malware that currently favors at least two vectors. ZeuS, CoinMiner, and CryptoWall are currently utilizing multiple vectors. ZeuS is dropped by other malware, but it is also delivered via malvertisement. CoinMiner utilizes the malspam and dropped vectors.

Malspam – Unsolicited emails, which either direct users to malicious web sites or trick users into downloading or opening malware. Top 10 Malware using this technique include Dridex, Kovter, NanoCore, and Cerber.

Network – Malware introduced through the abuse of legitimate network protocols or tools, such as SMB protocol or remote PowerShell. WannaCry uses this vector.

  1. ZeuS is a modular banking trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of it’s codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code.
  2. Dridex is a banking trojan that uses malicious macros in Microsoft Office with either malicious embedded links or attachments. Dridex is disseminated via malspam campaigns.
  3. NanoCore is a RAT spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence.
  4. CoinMiner is a cryptocurrency miner that uses Windows Management Instrumentation (WMI) and EternalBlue to spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence. CoinMiner spreads through malspam or is dropped by other malware.
  5. Gh0st is a RAT used to control infected endpoints. Gh0st is dropped by other malware to create a backdoor into a device that allows an attacker to fully control the infected device.
  6. Kovter is a fileless click fraud malware and a downloader that evades detection by hiding in registry keys. Reporting indicates that Kovter can have backdoor capabilities and uses hooks within certain APIs for persistence.
  7. CryptoWall is a ransomware commonly distributed through malspam with malicious ZIP attachments, Java Vulnerabilities, and malicious advertisements. Upon successful infection, CryptoWall will scan the system for drive letters, network shares, and removable drives.  CryptoWall runs on both 32-bit and 64-bit systems.
  8. Mirai is a malware botnet known to compromise Internet of Things (IoT) devices in order to conduct large-scale DDoS attacks. Mirai is dropped after an exploit has allowed the attacker to gain access to a machine.
  9. Cerber is an evasive ransomware that is capable of encrypting files in offline mode and is known for fully renaming files and appending them with a random extension. There are currently six versions of Cerber, which evolved specifically to evade detection by machine learning algorithms. Currently, version 1 is the only version of Cerber for which a decryptor tool is available.
  10. Pushdo is a botnet that has been active since 2007 and operates as a service for malware and spam distribution. Pushdo is known to distribute the Cutwail spambot. The malware uses encrypted communication channels and domain generation algorithms to send instructions to its zombie hosts.