Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Several types of cyber attacks have been seen targeting the remote collaboration app Zoom, as work from home brings a surge in active installations. Earlier, coinminers have also been bundled with the Zoom installer. Recently, another campaign was reported that bundles the WebMonitor RAT with the Zoom Installer. Note that although the installers are legitimate, the ones bundled with malware do not come from official sources of the Zoom app like Zoom’s own download center or legitimate app stores such as the Apple App Store and Google Play Store. They instead come from malicious sources. We also note that the Zoom app has been updated to version 5.0.cybercriminals may have repackaged the legitimate installers with WebMonitor RAT and released these repackaged installers in malicious sites.When running the ZoomInstaller.exe, it drops a copy of itself named Zoom.exe. ZoomInstaller.exe will then open the process notepad.exe to run Zoom.exe.
The backdoor connects to the URL dabmaster[.]wm01[.]to and executes commands from a remote malicious user, some of which are listed below (for the full list, please refer to our malware report):
It terminates itself when executed in the following virtual environments:
It also terminates itself if it finds a file name similar to any of the following:
Since the system downloaded a legitimate Zoom application version (4.6), it won’t make the users suspicious.
Hostname
dabmaster[.]wm01[.]to
MD5
c3973cd1e3ee7ab64b6ebeed5f9caf08
SHA-256
753418831fcf215fe2d00ed33b9d2f1ed78bc92355e780c782fb35228007318e
SHA1
b3b75d04355c38b265ac8d7a5f033b58fd138c17
Source IP
213[.]188[.]152[.]96
URL
https[:]//213[.]188[.]152[.]96/recv7[.]php