{"id":82852,"date":"2016-05-10T11:58:19","date_gmt":"2016-05-10T06:28:19","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=82852"},"modified":"2016-05-10T14:09:00","modified_gmt":"2016-05-10T08:39:00","slug":"bladabindi-virus-abusing-pastebin-com-as-infection-vector","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/bladabindi-virus-abusing-pastebin-com-as-infection-vector\/","title":{"rendered":"Bladabindi Malware Abusing Pastebin.com as Infection Vector"},"content":{"rendered":"<p>Earlier, malware authors kept their payloads on Command and Control (C&amp;C) servers or compromised websites. And to do this, they had to setup their C&amp;C server or compromise a genuine website. But now, they don\u2019t need to bother about such things, as they have started using genuine file sharing sites like \u201cPastebin.com\u201d which allows user to store malware in plain-text. Pastebin.com is a well-known website where users can store plain text.<\/p>\n<p>While analyzing malware samples, we found that the malware is downloading the \u201cBase64\u201d encoded text from pastebin.com. On decoding this Base64 data, we received an executable file which is the main payload of the malware. Most of these executables are from \u201cBladabindi\u201d family.<\/p>\n<p>The downloader enters into the user\u2019s computer using various techniques like spam emails and social engineering. In this report, we will see how pastebin.com is misused with analysis of one malware sample.<\/p>\n<p><strong>Analysis of <\/strong><strong>Bladabindi (MD5: 0C34D70FF9DD1BA3B7BFE9F4FBA8F010)<\/strong><\/p>\n<p>The file is an Auto-it installer. On execution, it drops two executable files at <strong>&#8220;C:\\Documents and Settings\\[user]\\Local Settings&#8221; <\/strong>and executes the same. The dropped files are as follows:<\/p>\n<ol>\n<li><strong> TempWinToFlash.exe: <\/strong>Genuine tool used to create bootable USB with any Windows Setup from a DVD\/ISO<\/li>\n<li><strong> TempWindows.exe: <\/strong>Copies itself in \u201c%temp%\u201d as system.exe and executes it. Now this system.exe downloads Base64 encoded file from &#8220;pastebin.com\\download.php?i=pejXu40a&#8221; decodes it and injects the decoded executable in self-process. Thereafter, all activities are carried out by this downloaded file.<\/li>\n<\/ol>\n<p>This Base64 Encoded file on Pastebin.com looks like the below figure 1.<\/p>\n<figure id=\"attachment_82853\" aria-describedby=\"caption-attachment-82853\" style=\"width: 926px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-82853\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-1.jpg\" alt=\"Figure 1\" width=\"926\" height=\"546\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-1.jpg 1013w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-1-300x177.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-1-789x465.jpg 789w\" sizes=\"(max-width: 926px) 100vw, 926px\" \/><\/a><figcaption id=\"caption-attachment-82853\" class=\"wp-caption-text\">Figure 1<\/figcaption><\/figure>\n<p>After <strong>Base64 decode <\/strong>it is <strong>.Net <\/strong>file as below<strong>.<\/strong><\/p>\n<figure id=\"attachment_82854\" aria-describedby=\"caption-attachment-82854\" style=\"width: 876px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-82854\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-2.jpg\" alt=\"Figure 2\" width=\"876\" height=\"493\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-2.jpg 894w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-2-300x169.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-2-789x444.jpg 789w\" sizes=\"(max-width: 876px) 100vw, 876px\" \/><\/a><figcaption id=\"caption-attachment-82854\" class=\"wp-caption-text\">Figure 2<\/figcaption><\/figure>\n<p><strong>Activity of Main_Component.exe (In memory component)<\/strong><\/p>\n<p>This component is developed using Microsoft Visual Basic.Net.<\/p>\n<p><strong>Auto-run<\/strong><\/p>\n<p>It copies system.exe in \u201cStartup\u201d folder as 12ce4e06a81e8d54fd01d9b762f1b1bb.exe<\/p>\n<p><strong>Registry changes for Auto-run<\/strong><\/p>\n<p>It adds the following auto-run registry entry:<\/p>\n<ol>\n<li>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\<\/li>\n<\/ol>\n<p>12ce4e06a81e8 d54fd01d9b762f1b1bb:\u00a0 &#8220;%temp%\\system.exe&#8221;<\/p>\n<ol start=\"2\">\n<li>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\<\/li>\n<\/ol>\n<p>12ce4e06a81e8d54fd01d9b762f1b1bb : &#8220;%temp%\\system.exe&#8221;<\/p>\n<p><strong>Other Registry Changes<\/strong><\/p>\n<p>It also adds the following registry entry:<\/p>\n<p>HKEY_CURRENT_USER\\Environment\\SEE_MASK_NOZONECHECKS = 1<\/p>\n<p>Further it saves downloaded Base64 encoded data in registry such as:<\/p>\n<p>HKEY_CURRENT_USER\\Software\\12ce4e06a81e8d54fd01d9b762f1b1bb\\f8c065f4e758233f0d12dc9b8cf7a2ce = [Base64_Encoded_Main_Payload]<\/p>\n<p><strong>Bypass Firewall:<\/strong><\/p>\n<p>It executes the following command to bypass Firewall:<\/p>\n<p>netsh firewall add allowedprogram\u00a0 [Path_Of_system.exe] ENABLE<\/p>\n<p><strong>Main Activity<\/strong><\/p>\n<p>This backdoor gathers the following data and sends it to C&amp;C server:<\/p>\n<ul>\n<li>Computer name<\/li>\n<li>User name<\/li>\n<li>OS version<\/li>\n<li>Date of installation<\/li>\n<\/ul>\n<p>It provides the following RAT functionalities to the attacker:<\/p>\n<ul>\n<li>Keylogging<\/li>\n<li>Capturing screenshots<\/li>\n<li>Bypassing Firewall<\/li>\n<li>Process Management: start new process or kill any process<\/li>\n<li>Registry Management: get or set registry key\/value<\/li>\n<li>Provides remote shell access to the attacker<\/li>\n<li>Downloading and executing files<\/li>\n<li>Updating current RAT<\/li>\n<li>Compressing files for uploading<\/li>\n<li>Deleting self-copies<\/li>\n<\/ul>\n<p>The main payload of the virus saves all keystrokes in the registry as shown in figure 3.<\/p>\n<figure id=\"attachment_82855\" aria-describedby=\"caption-attachment-82855\" style=\"width: 777px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-82855\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-3.jpg\" alt=\"Figure3\" width=\"777\" height=\"333\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-3.jpg 777w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-3-300x129.jpg 300w\" sizes=\"(max-width: 777px) 100vw, 777px\" \/><\/a><figcaption id=\"caption-attachment-82855\" class=\"wp-caption-text\">Figure3<\/figcaption><\/figure>\n<p><strong>Encryption and decryption<\/strong><\/p>\n<p>The malware sends all data in Base64 encoded format. Except files are uploaded after ZIP compression.<\/p>\n<p>The backdoor supports following commands:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"237\"><strong>\u201cCAP\u201d<\/strong><\/td>\n<td width=\"402\">Take screen shot and send it to C&amp;C.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>&#8220;kl\u201d<\/strong><\/td>\n<td width=\"402\">Sends key logged data in Base64 encoded format.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>\u201crn\u201d<\/strong><\/td>\n<td width=\"402\">Download and execute file.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>\u201cun\u201d + \u201c~\u201d<\/strong><\/td>\n<td width=\"402\">Bypass firewall\u00a0 by using<\/p>\n<p>\u201cnetsh firewall delete allowedprogram \\&#8221;&#8221;.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>\u201cun\u201d + \u201c!\u201d<\/strong><\/td>\n<td width=\"402\">End current application.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>\u201cun\u201d + \u201c@\u201d<\/strong><\/td>\n<td width=\"402\">Start new process and end current application.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>\u201cUp\u201d<\/strong><\/td>\n<td width=\"402\">Update RAT downloads new file and replace it with current.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>rss<\/strong><\/td>\n<td width=\"402\">Remote shell<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>inf<\/strong><\/td>\n<td width=\"402\">Send information of installed malware component like:<\/p>\n<p>Installed volumes serial number, Auto run Registry Key, Exe Process with path, etc.<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>RG + \u201c~\u201d<\/strong><\/td>\n<td width=\"402\">List all registry sub-keys and\u00a0 values of specified registry key<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>RG +\u00a0 \u201c!\u201d<\/strong><\/td>\n<td width=\"402\">Set Registry value as specified key<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>RG +\u00a0 \u201c@\u201d<\/strong><\/td>\n<td width=\"402\">Delete value for specified Registry key<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>RG +\u00a0 \u201c#\u201d<\/strong><\/td>\n<td width=\"402\">Create Sub-Key for specified key<\/td>\n<\/tr>\n<tr>\n<td width=\"237\"><strong>RG +\u00a0 \u201c$\u201d<\/strong><\/td>\n<td width=\"402\">Delete sub-key tree for specified registry key<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Tricks used by the malware to avoid detection and cleaning<\/strong><\/p>\n<ol>\n<li><strong> Critical process<\/strong><\/li>\n<\/ol>\n<p>It makes itself as a critical process to prevent it from being stopped. The infected system may crash with a stop code 0x000000F4 if the malware process is interrupted. This can make it difficult to clean the computer when the malware is running.<\/p>\n<ol start=\"2\">\n<li><strong>Registry resident non executable payload<\/strong><\/li>\n<\/ol>\n<p>Downloaded file is never saved on the disk, but it gets saved in the registry. The next time the system is booted, the downloaded file is read from the registry and decoded; the decoded executable is then injected into the system.exe process.<\/p>\n<ol start=\"3\">\n<li><strong> Bypass automated analysis or make analysis difficult<\/strong><\/li>\n<\/ol>\n<p>The first component mentioned above (0C34D70FF9DD1BA3B7BFE9F4FBA8F010) is an auto-it installer. The Auto-It script contains the following code:<\/p>\n<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-82861\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2016\/05\/bladabindi-4.jpg\" alt=\"bladabindi 4\" width=\"514\" height=\"150\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-4.jpg 449w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2016\/05\/bladabindi-4-300x88.jpg 300w\" sizes=\"(max-width: 514px) 100vw, 514px\" \/><\/a><\/p>\n<p>Due to this code, it will not show any malicious activity when any one of these monitoring tools is running. This enables the malware to bypass automated analysis. It also makes it difficult for analysts to manually analyze the sample.<\/p>\n<p><strong>Statistics about the \u201cpastebin.com\u201d<\/strong><\/p>\n<p>The main payload is stored in Base64 encoded format. We have found more than 100 Base64 encoded files on \u201cpastebin.com\u201d<strong>. <\/strong>Almost all of these files are malicious. Interestingly, 90% of them belong to the same malware family i.e., Bladabindi. The Bladabindi samples have been listed below:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"145\"><strong>File Name<\/strong><\/td>\n<td width=\"283\"><strong>MD5(After Base64 Decryption)<\/strong><\/td>\n<td width=\"108\"><strong>Date Uploaded<\/strong><\/td>\n<td width=\"88\"><strong>No. of Downloads<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"145\">maYGSJCE.txt<\/td>\n<td width=\"283\">d6970b1ecb80a3d547e8f4e02cee5398<\/td>\n<td width=\"108\">24-Jan-16<\/td>\n<td width=\"88\">1288<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">6A2bWaLW.txt<\/td>\n<td width=\"283\">3bbcf3bd1da31a9db42016c4df579efe<\/td>\n<td width=\"108\">7-Feb-16<\/td>\n<td width=\"88\">46<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">etyinjbb.txt<\/td>\n<td width=\"283\">e52e16c23ae389045ce8f3016baf2917<\/td>\n<td width=\"108\">9-Feb-16<\/td>\n<td width=\"88\">60<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">ypi89T1N.txt<\/td>\n<td width=\"283\">50bdce08a13587a9163d2e3e15038b3c<\/td>\n<td width=\"108\">11-Feb-16<\/td>\n<td width=\"88\">96<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">Kc063FLa.txt<\/td>\n<td width=\"283\">0ca6c92280ca9f6c0d6f3de565102789<\/td>\n<td width=\"108\">13-Feb-16<\/td>\n<td width=\"88\">90<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">r73g5ZcQ.txt<\/td>\n<td width=\"283\">6cafb49af51a081dfabea417ddf63382<\/td>\n<td width=\"108\">15-Feb-16<\/td>\n<td width=\"88\">17<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">4vkGXgMm.txt<\/td>\n<td width=\"283\">0332726731694abcc3859ab31d910178<\/td>\n<td width=\"108\">19-Feb-16<\/td>\n<td width=\"88\">46<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">4UNdJehk.cs<\/td>\n<td width=\"283\">777252b978e8fded255d87dd4e141865<\/td>\n<td width=\"108\">25-Feb-16<\/td>\n<td width=\"88\">49<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">g4TpnaQx.txt<\/td>\n<td width=\"283\">291b7a2bccc2cd132a3a7ada301687ca<\/td>\n<td width=\"108\">25-Feb-16<\/td>\n<td width=\"88\">50<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">YyVDCPGF.txt<\/td>\n<td width=\"283\">e52c69649019a84e4f00616b029c4813<\/td>\n<td width=\"108\">29-Feb-16<\/td>\n<td width=\"88\">46<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">G4pyW8Nd.cs<\/td>\n<td width=\"283\">6926608e7cf967597ab16a8e615a1295<\/td>\n<td width=\"108\">1-Mar-16<\/td>\n<td width=\"88\">48<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">PnTq9Tzu.txt<\/td>\n<td width=\"283\">8c3906072e1767ce83fde2dcfb4ae5a0<\/td>\n<td width=\"108\">4-Mar-16<\/td>\n<td width=\"88\">41<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">sN33WjEs.txt<\/td>\n<td width=\"283\">c38f4c069940318236f265df4bf50369<\/td>\n<td width=\"108\">6-Mar-16<\/td>\n<td width=\"88\">43<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">7kmFXuv2.txt<\/td>\n<td width=\"283\">8fc065c4e26c3088f4ee510d679fcb50<\/td>\n<td width=\"108\">6-Mar-16<\/td>\n<td width=\"88\">45<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">qgW3iaZd.txt<\/td>\n<td width=\"283\">e00d4bc57c9613d78b89c6175fa5c422<\/td>\n<td width=\"108\">6-Mar-16<\/td>\n<td width=\"88\">55<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">tNyvK9La.txt<\/td>\n<td width=\"283\">5c6365694e219baaa93c964265a99d8e<\/td>\n<td width=\"108\">10-Mar-16<\/td>\n<td width=\"88\">46<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">QmYfNwMe.txt<\/td>\n<td width=\"283\">cbaebc74b7991028d8b0deb7a7feef5b<\/td>\n<td width=\"108\">13-Mar-16<\/td>\n<td width=\"88\">46<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">w8pR9Kx7.txt<\/td>\n<td width=\"283\">54a00dce2b6150b991d69d72aa20f88f<\/td>\n<td width=\"108\">27-Mar-16<\/td>\n<td width=\"88\">61<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">WPveSANA.txt<\/td>\n<td width=\"283\">dd7971459d2f2436a2d7ded062560ebe<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">54<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">vbFuaG8B.txt<\/td>\n<td width=\"283\">e1d6994007b77db2137b3c37211da641<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">42<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">jKjxmp3H.txt<\/td>\n<td width=\"283\">011b816123c586362ff84c40c5367e5f<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">47<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">JL0AhHvt.txt<\/td>\n<td width=\"283\">cfdd43745ada1e35e0d54a1c03372fc5<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">42<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">J7yDkhG4.cs<\/td>\n<td width=\"283\">37087fb23720f2d153d5d93ff5ac2b02<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">47<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">FWy2Bwze.txt<\/td>\n<td width=\"283\">f712efdecf834da398a68ceb2b1066bc<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">50<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">d7b36SCq.txt<\/td>\n<td width=\"283\">b6029da18724abd87efbab6942cf2ad<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">50<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">b2S1QH7b.txt<\/td>\n<td width=\"283\">4befc92ce3d59e7f91c29d967cb2e51<\/td>\n<td width=\"108\">28-Mar-16<\/td>\n<td width=\"88\">47<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">wWUCRtUn.txt<\/td>\n<td width=\"283\">7B75861CCF60960CB7A4510F62DCC759<\/td>\n<td width=\"108\">3-Aug-15<\/td>\n<td width=\"88\">204<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">X9qT2gdv.txt<\/td>\n<td width=\"283\">B6E3214B8571667E9E6C8D949143A409<\/td>\n<td width=\"108\">2-Aug-15<\/td>\n<td width=\"88\">203<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">pMFr9T7Z.txt<\/td>\n<td width=\"283\">95175B900A661E6517466ECDBB11F8EC<\/td>\n<td width=\"108\">2-Aug-15<\/td>\n<td width=\"88\">182<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">WSm8bhnD.txt<\/td>\n<td width=\"283\">38C833ED93ECCB73EA652749AB5FF6D2<\/td>\n<td width=\"108\">2-Aug-15<\/td>\n<td width=\"88\">189<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">q6TcsD93.txt<\/td>\n<td width=\"283\">A7DE2A7A3E88EC73A6E5DDDAF1EBFEF4<\/td>\n<td width=\"108\">1-Aug-15<\/td>\n<td width=\"88\">211<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">5c4Gkx4s.txt<\/td>\n<td width=\"283\">1DA67EB93E87C84F538D7070EB9EF946<\/td>\n<td width=\"108\">1-Aug-15<\/td>\n<td width=\"88\">229<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">gmePj6As.txt<\/td>\n<td width=\"283\">B31E511502634C47067B2247D487AE52<\/td>\n<td width=\"108\">30-Jul-15<\/td>\n<td width=\"88\">170<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">B0YtjY5d.txt<\/td>\n<td width=\"283\">0C9F01C2417B8E45C51E29A544B5D8FE<\/td>\n<td width=\"108\">30-Jul-15<\/td>\n<td width=\"88\">212<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">SDfnfN22.txt<\/td>\n<td width=\"283\">467DEE8AC854B9294D818900847EC986<\/td>\n<td width=\"108\">30-Jul-15<\/td>\n<td width=\"88\">182<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">UCNZ6vAT.txt<\/td>\n<td width=\"283\">D46A18E03CA59BD1F9925C70D3C537C1<\/td>\n<td width=\"108\">29-Jul-15<\/td>\n<td width=\"88\">192<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">bJWCCZcH.txt<\/td>\n<td width=\"283\">712B9273724AFE942B52D31593EBC020<\/td>\n<td width=\"108\">28-Jul-15<\/td>\n<td width=\"88\">192<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">ziN2uncg.txt<\/td>\n<td width=\"283\">C4481C61E8FC87627E74B9E86DFA5984<\/td>\n<td width=\"108\">22-Jul-15<\/td>\n<td width=\"88\">195<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">zy7aQ0XC.txt<\/td>\n<td width=\"283\">959E924082E4F6B12CFC802FD0E5E2CB<\/td>\n<td width=\"108\">14-Jul-15<\/td>\n<td width=\"88\">156<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">dcQbqCHN.txt<\/td>\n<td width=\"283\">E50FD6BC5E6969AA3D10C34ED9EAC0BB<\/td>\n<td width=\"108\">22-Jul-15<\/td>\n<td width=\"88\">189<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">8y93ZV9w.txt<\/td>\n<td width=\"283\">80E4F2BD93CFAD05C27D82DB52A67173<\/td>\n<td width=\"108\">2-Jul-15<\/td>\n<td width=\"88\">233<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">hcYBCaqP.txt<\/td>\n<td width=\"283\">CEA83249D6DD7E0DA1233AA694A241A4<\/td>\n<td width=\"108\">27-Jul-15<\/td>\n<td width=\"88\">209<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">J9HkHtEQ.txt<\/td>\n<td width=\"283\">0CAD1A373392EB6C494F8B1991E45978<\/td>\n<td width=\"108\">24-Jul-15<\/td>\n<td width=\"88\">195<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">ympQ7j6V.txt<\/td>\n<td width=\"283\">9F6BD8384EF226AC45AEF44D6DB54391<\/td>\n<td width=\"108\">14-Jul-15<\/td>\n<td width=\"88\">178<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">ynbvfred.txt<\/td>\n<td width=\"283\">1642873BBEF7D991DF11539E16CA6000<\/td>\n<td width=\"108\">29-Jul-15<\/td>\n<td width=\"88\">217<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">ZwCAc7A4.txt<\/td>\n<td width=\"283\">6C30D822F38114E6D2B68BD7A7618568<\/td>\n<td width=\"108\">15-Jun-15<\/td>\n<td width=\"88\">219<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">KCyVSNK1.txt<\/td>\n<td width=\"283\">800388926C83A71121562308FDC1B105<\/td>\n<td width=\"108\">23-Apr-15<\/td>\n<td width=\"88\">191<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">7GC1AXmv.txt<\/td>\n<td width=\"283\">2B155E4268482A8CEE87CA27E400C803<\/td>\n<td width=\"108\">19-Mar-15<\/td>\n<td width=\"88\">211<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">Ym7e4iDh.txt<\/td>\n<td width=\"283\">F15353C8FD5EA57C02417A8921DCBD5B<\/td>\n<td width=\"108\">27-Mar-15<\/td>\n<td width=\"88\">218<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">KPuZ5NQX.txt<\/td>\n<td width=\"283\">487C285566533C4CFC9AF6A3814CBB3B<\/td>\n<td width=\"108\">23-Jan-15<\/td>\n<td width=\"88\">215<\/td>\n<\/tr>\n<tr>\n<td width=\"145\">kjipFGzz.txt<\/td>\n<td width=\"283\">652302915BDE357879A8594E62E32808<\/td>\n<td width=\"108\">13-Oct-14<\/td>\n<td width=\"88\">220<\/td>\n<\/tr>\n<tr>\n<td width=\"145\"><strong>TOTAL<\/strong><\/td>\n<td width=\"283\"><\/td>\n<td width=\"108\"><\/td>\n<td width=\"88\"><strong>7564<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Quick Heal Detection<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"173\"><strong>Component Name\/Description<\/strong><\/td>\n<td width=\"275\"><strong>MD5<\/strong><\/td>\n<td width=\"227\"><strong>Quick Heal Detection Name<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"173\">Random_Name.exe<\/td>\n<td width=\"275\">0C34D70FF9DD1BA3B7BFE9F4FBA8F010<\/td>\n<td width=\"227\">TrojanDownldr.Bladabindi.BS64<\/td>\n<\/tr>\n<tr>\n<td width=\"173\">TempWindows.exe<\/td>\n<td width=\"275\">EBB8BC149C8D7FFBAFD8D232BDD9D796<\/td>\n<td width=\"227\">TrojanDownldr.Bladabindi.BS64<\/td>\n<\/tr>\n<tr>\n<td width=\"173\">Main Payload<\/td>\n<td width=\"275\">959E924082E4F6B12CFC802FD0E5E2CB<\/td>\n<td width=\"227\">Backdoor.Bladabindi.AL3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Malware authors are abusing <b>\u201cpastebin.com\u201d <\/b>for spreading different malware families. As per our analysis among all these families, <b>\u201cBladabindi\u201d<\/b> RAT is spreading rapidly. More than <b>7500<\/b> users have been infected via pastebin.com since 2015. As the main payload is never stored on the disk, it is difficult to detect such malware.<\/p>\n<p><strong>Acknowledgment<\/strong><\/p>\n<p><strong>Subject Matter Experts<\/strong><\/p>\n<ul>\n<li>Prakash Galande<\/li>\n<li>Sagar Daundkar<br \/>\n&#8211; Threat Research &amp; Response Team<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier, malware authors kept their payloads on Command and Control (C&amp;C) servers or compromised websites. And to do this, they had to setup their C&amp;C server or compromise a genuine website. But now, they don\u2019t need to bother about such things, as they have started using genuine file sharing sites like \u201cPastebin.com\u201d which allows user [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[1320],"class_list":["post-82852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","tag-bladabindi"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82852"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=82852"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82852\/revisions"}],"predecessor-version":[{"id":82862,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/82852\/revisions\/82862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82857"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=82852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=82852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=82852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}