{"id":1150,"date":"2020-12-31T14:57:41","date_gmt":"2020-12-31T14:57:41","guid":{"rendered":"https:\/\/zerothcode.com\/blog\/?p=1150"},"modified":"2020-12-31T14:57:41","modified_gmt":"2020-12-31T14:57:41","slug":"banking-malware-password-stealer","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/banking-malware-password-stealer\/","title":{"rendered":"AutoHotkey-Based Password Stealer Targeting US, Canadian Banking Users"},"content":{"rendered":"<p>banking-malware Threat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of an ongoing campaign that started early 2020.<\/p>\n<h4>banking-malware Customers of financial institutions in the US and Canada are among the primary targets for credential exfiltration, with a specific focus on banks such as Scotiabank,<\/h4>\n<p>Royal Bank of Canada, HSBC, Alterna Bank, Capital One, Manulife, and EQ Bank. Also included in the list is an Indian banking firm ICICI Bank.<\/p>\n<p>AutoHotkey\u00a0is an open-source custom scripting language for Microsoft Windows aimed at providing easy hotkeys for macro-creation<\/p>\n<p>and software automation that allows users to automate repetitive tasks in any Windows application.<\/p>\n<p>The multi-stage infection chain commences with a malware-laced Excel file that&#8217;s embedded with a Visual Basic for Applications (VBA)\u00a0AutoOpen\u00a0macro,<\/p>\n<p>which is subsequently used to drop and execute the downloader client script (&#8220;adb.ahk&#8221;) via a legitimate portable AHK script compiler executable (&#8220;adb.exe&#8221;).<\/p>\n<div class=\"separator\">\n<figure style=\"width: 728px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/thehackernews.com\/images\/-b8Ck2n7G-50\/X-rq11Sj2fI\/AAAAAAAABXs\/k3udm2hvqKoemLNx_AIgNsfNjmn8WZwmACLcBGAsYHQ\/s0\/password-stealer.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"password stealer\" src=\"https:\/\/thehackernews.com\/images\/-b8Ck2n7G-50\/X-rq11Sj2fI\/AAAAAAAABXs\/k3udm2hvqKoemLNx_AIgNsfNjmn8WZwmACLcBGAsYHQ\/s728-e1000\/password-stealer.jpg\" alt=\"banking-malware\" width=\"728\" height=\"629\" border=\"0\" data-original-height=\"629\" data-original-width=\"728\" \/><\/a><figcaption class=\"wp-caption-text\">banking-malware<\/figcaption><\/figure>\n<\/div>\n<p>The downloader client script is also responsible for achieving persistence, profiling victims,<\/p>\n<p>and downloading and running additional AHK scripts from command-and-control (C&amp;C) servers located in the US, the Netherlands, and Sweden.<\/p>\n<p>What makes this malware different is that instead of receiving commands directly from the C&amp;C server,<\/p>\n<p>it downloads and executes AHK scripts to accomplish different tasks.<\/p>\n<p>&#8220;By doing this, the attacker can decide to upload a specific script to achieve customized tasks for each user or group of users,&#8221; Trend Micro researchers\u00a0said in an analysis.<\/p>\n<p>&#8220;This also prevents the main components from being revealed publicly, specifically to other researchers or to sandboxes.&#8221;<\/p>\n<p>Chief among them is a credential stealer that targets various browsers such as Google Chrome, Opera, Microsoft Edge, and more.<\/p>\n<p>Once installed, the stealer also attempts to download an SQLite module (&#8220;sqlite3.dll&#8221;) on the infected machine, using it to perform SQL queries against the SQLite databases within browsers&#8217; app folders.<\/p>\n<p>In the final step, the stealer collects and decrypts credentials from browsers and exfiltrates the information to the C&amp;C server in plaintext via an HTTP POST request.<\/p>\n<p>Noting that the malware components are &#8220;well organized at the code level,&#8221;<\/p>\n<p>the researchers suggest the inclusion of usage instructions (written in Russian) could imply a &#8220;hack-for-hire&#8221; group that&#8217;s behind the attack chain&#8217;s creation and is offering it to others as a service.<\/p>\n<p>&#8220;By using a scripting language that lacks a built-in compiler within a victim&#8217;s operating system,<\/p>\n<p>loading malicious components to achieve various tasks separately, and changing the C&amp;C server frequently, the attacker has been able to hide their intention from sandboxes,&#8221;<\/p>\n<p>the researchers concluded.<\/p>\n<p>Read More :<a href=\"https:\/\/zerothcode.com\/blog\/hackers-install-backdoor-mssql-hacking\/\">https:\/\/zerothcode.com\/blog\/hackers-install-backdoor-mssql-hacking\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>banking-malware Threat actors have been discovered distributing a new credential stealer written in AutoHotkey (AHK) scripting language as part of<\/p>\n","protected":false},"author":1,"featured_media":1151,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[255,394,696,1198,389],"class_list":["post-1150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1150"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1151"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1150"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}