TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Gozi Adds Evasion Techniques to its Growing Bag of Tricks

2019-01-29 · Read original ↗

ATT&CK techniques detected

8 predictions
T1027.002Software Packing
96%
"##s and finalizes the theft. figure 9. the parameters of the malicious transaction are tailored for each bank ’ s application additional techniques gozi uses a few other techniques that are worth mentioning : append logic inside jquery. this method bypasses several checks and sec…"
T1657Financial Theft
86%
"the attackers ’ hands. crucial javascript events like form submission are intercepted and the data that ' s captured ( for example, information to transfer funds ), is used to redirect money to the attacker ’ s bank account. because client - side code is easy to examine ( with a …"
T1566.002Spearphishing Link
66%
"demonstrating their knowledge and experience by using techniques that circumvent a target ’ s defense mechanisms to evade detection. we ’ re seeing this trend in almost every piece of code that descends from banking malware. it ’ s critically important for banks and financial ins…"
T1027Obfuscated Files or Information
60%
"##t is resolved dynamically and used by the program when necessary. next - stage malicious code ( that is, entries containing scripts and binaries ) is hidden inside the windows registry ( similar to techniques used in the kovter / powlik trojans ) as part of the fileless attack …"
T1555.003Credentials from Web Browsers
43%
", gozi adds the username and password as query strings of a relative url belonging to the bank ( which afterward redirects the user to a malicious domain ). both the creation and removal of the external script occur in fractions of a second. once the external script is loaded, a …"
T1055.012Process Hollowing
42%
"##3bee7594823e69abe05034c1efa58a15f0bb9f54cf9e42b25954108bce97a4 f4fbe35c82a821303216b0b5761ce3d8569d9db07748a708552714100cd21b84 c771ae8c099f5bda7cad9d852294209484c21a3e4f04b090c8e7d4f08e7172e3"
T1059.007JavaScript
37%
"##zi ’ s presence intercepting javascript ’ s native functions allows gozi to manipulate detection actions performed by the bank and thereby remain undetected. triggering a malicious transaction the option of sending an immediate transaction via a funds transfer in a user ’ s onl…"
T1185Browser Session Hijacking
33%
", gozi adds the username and password as query strings of a relative url belonging to the bank ( which afterward redirects the user to a malicious domain ). both the creation and removal of the external script occur in fractions of a second. once the external script is loaded, a …"

Summary

Gozi “banking” trojan continues to shift its targets beyond banking as it employs client-side and server-side evasion techniques via time-tested web injection.