CIS Logo
tagline: Confidence in the Connected World
HomeResourcesBlog postTop 10 Malware April 2018

Top 10 Malware April 2018

April saw decreases across the board in notifications, driven by a significant decrease in Emotet, as well as drops in Redyms and TinyLoader. This led to a 23% decrease in Top 10 activity. Only the multiple vector increased in April 2018, due to an increase in ZeuS activity. The malspam vector continues to remain the primary entry vector, but experienced a 24% decrease due primarily to a decrease in Emotet activity, which was not fully counteracted by the increase in Kovter activity. Malvertisement activity bottomed out with no malware in the Top 10 Malware currently using the vector. This continues the trend of low malvertisement activity. Though another malware with the dropped vector made it into the Top 10 Malware, overall there was an 18% decrease in dropped activity.

Top 10 Malware April 2018

 

Top Infection Vectors April 2019

The MS-ISAC Top 10 Malware refers to the top 10 new actionable event notifications of non-generic malware signatures sent out by the MS-ISAC Security Operations Center (SOC).

Dropped – Malware dropped by other malware already on the system or by an exploit kit.

Malvertisement – Malware introduced through a malicious advertisement.

Multiple – Refers to malware that currently favors at least two vectors.

Malspam – Unsolicited emails, which either direct users to download malware from malicious websites or trick the user into opening malware through an attachment.

  1. Kovter is a click fraud trojan. It is disseminated via malspam email attachments containing malicious office macros. Kovter is fileless malware that evades detection by hiding in registry keys. Some reports indicate that Kovter infections have received updated instructions from command and control infrastructure to serve as a remote access backdoor.
  2. ZeuS is a modular banking Trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS/Zbot source code in 2011, many other malware variants have adopted parts of its codebase, which means that events classified as ZeuS/Zbot may actually be other malware using parts of the ZeuS/Zbot code.
  3. Emotet is a modular Trojan that downloads or drops banking Trojans. Initial infection occurs via malspam emails that contain malicious download links, a PDF with embedded links, or a macro-enabled Word attachment. Emotet incorporates spreader modules in order to propagate throughout a network. Emotet is known to download/drop the Pinkslipbot and Dridex banking Trojans. Currently, there are four known spreader modules: Outlook scraper, WebBrowserPassView, Mail PassView, and a credential enumerator.
  4. CoinMiner is a cryptocurrency miner that was initially disseminated via malvertising. Once a machine is infected, CoinMiner uses Windows Management Instrument (WMI) and EternalBlue to exploit SMB and spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence.
  5. NanoCore is a Remote Access Trojan (RAT) spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence.
  6. Xtrat is a RAT that is delivered via malspam and has the capability to receive commands such as File Management (Download, Upload, and Execute Files), Registry Management (Add, Delete, Query, and Modify Registry), Perform Shell Command, Computer Control (Shutdown, Log on/off), and Screen capture.
  7. Redyms is a click-fraud trojan that is primarily downloaded and dropped via exploit kit. Redyms has virtualization and sandbox detection and is primarily distributed in the United States.
  8. WannaCry is a ransomware worm that uses the EternalBlue exploit to spread. Version 1.0 is known to have a “killswitch” domain, which stops the encryption process. Later versions do not have a “killswitch” domain. WannaCry is disseminated via malspam.
  9. Mirai is a malware botnet known to compromise Internet of Things (IoT) devices in order to conduct large-scale distributed denial of service (DDoS) attacks. Mirai is dropped after an exploit has allowed the attacker to gain access to a machine.
  10. Gh0st is a RAT used to control infected endpoints. Gh0st is dropped by other malware to create a backdoor into a device, allowing an attacker to fully control the infected device.