CIS Logo
tagline: Confidence in the Connected World

Top 10 Malware September 2019

The Top 10 Malware variants for September closely resemble those of the previous month with the exception of Bifrose and CryptoWall. The proportion of Top 10 Malware to Total Malware activity is 57% in September, indicating the Top 10 Malware variants are driving the rate of malware infections.
Malware-Notifications-September-2019
Top-10-Malware-September-2019

In September 2019, malware utilizing multiple initiation vectors accounted for the greatest number of alerts in the Top 10 malware list. ZeuS and TrickBot infections account for the rise in activity within the multiple category over the last 5 months. Dridex, Kovter, Ursnif, and NanoCore drive the increase in malspam related infections for the month of September. Malspam is highly likely to continue to rise with the resumption of Emotet distribution campaigns. In May, the MS-ISAC disabled some duplicate and low confidence signatures associated with WannaCry (network vector) resulting in a substantial decrease in alerts.

In September 2019, malware utilizing multiple initiation vectors accounted for the greatest number of alerts in the Top 10 malware list. ZeuS and TrickBot infections account for the rise in activity within the multiple category over the last 5 months. Dridex, Kovter, Ursnif, and NanoCore drive the increase in malspam related infections for the month of September. Malspam is highly likely to continue to rise with the resumption of Emotet distribution campaigns. In May, the MS-ISAC disabled some duplicate and low confidence signatures associated with WannaCry (network vector) resulting in a substantial decrease in alerts.

Dropped – Malware delivered by other malware already on the system, an exploit kit, infected third-party software, or manually by a cyber threat actor. Currently Gh0st is being dropped.

Multiple – Malware that currently favors at least two vectors. ZeuS, CoinMiner, TrickBot, CryptoWall, and Bifrose are currently utilizing multiple vectors. ZeuS is dropped by other malware, but it is also delivered via malvertisement. CoinMiner utilizes the malspam and dropped vectors. TrickBot is dropped by Emotet and also delivered via malspam

Malspam – Unsolicited emails, which either direct users to malicious web sites or trick users into downloading or opening malware. Top 10 Malware using this technique include NanoCore, Kovter, Dridex, and Ursnif.

Network – Malware introduced through the abuse of legitimate network protocols or tools, such as SMB protocol or remote PowerShell. WannaCry uses this vector.

  1. ZeuS is a modular banking trojan that uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of it’s codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code.
  2. TrickBot is a modular banking trojan that is known to be dropped by Emotet as well as spread via malspam campaigns. TrickBot is also known to download the IcedID banking trojan.Gh
  3. Dridex is a banking trojan that uses malicious macros in Microsoft Office with either malicious embedded links or attachments. Dridex is disseminated via malspam campaigns.
  4. CoinMiner is a cryptocurrency miner that uses Windows Management Instrumentation (WMI) and EternalBlue to spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence. CoinMiner spreads through malspam or is dropped by other malware.
  5. Gh0st is a RAT used to control infected endpoints. Gh0st is dropped by other malware to create a backdoor into a device that allows an attacker to fully control the infected device.
  6. Kovter is a fileless click fraud malware and a downloader that evades detection by hiding in registry keys. Reporting indicates that Kovter can have backdoor capabilities and uses hooks within certain APIs for persistence.
  7. Ursnif, and its variant Dreambot, are banking trojans known for weaponizing documents. Ursnif recently upgraded its web injection attacks to include TLS callbacks in order to obfuscate against anti-malware software. Ursnif collects victim information from login pages and web forms.
  8. CryptoWall is a ransomware commonly distributed through malspam with malicious ZIP attachments, Java Vulnerabilities, and malicious advertisements. Upon successful infection, CryptoWall will scan the system for drive letters, network shares, and removable drives. CryptoWall runs on both 32-bit and 64-bit systems.
  9. NanoCore is a RAT spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence.
  10. Bifrose is a RAT that first appeared on the scene in 2004. Its capabilities include keylogging, screen capture, cam capture, remote shell, credential stealing, and registry access. Since its initial introduction, Bifrose has previously been sold to additional cybercriminal grou