Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A new Trojan (unnamed) being spread as a visa application. The legitimate application is encrypted within the dropper used to spread the Trojan. This particular malware contains a 32 and 64-bit next stage malware. Using little known HTTP status codes, the malware operators are able to command the Trojan on its next steps. The malware is able to acquire the target’s geolocation, gather host and network data, keylogging, and screenshots. The Trojan is self-propagating and has a dynamically resolving address to further complicate analysis. In order to exfiltrate data to the C2, the malware uses RSA encryption. Additionally, the Trojan is able to hide data locally using LZNT1 and a one-byte XOR encryption. At this time, it is unknown how the malware is added to systems, however, the analysis revealed the first stage dropper was downloaded from a shared directory on the local area network. The Trojan is able to use .DOC and .PDF files as transport for delivery of the main module. It is within this module where the HTTP status-based Trojan resides. As long as the C2 supports TLS in its configuration, communications will be over HTTPS and port 443. If TLS is not supported, all communication is over HTTP and port 80.