Highly Flexible Marap Malware Enters the Financial Scene
A new downloader, which has been spotted in an array of recent email campaigns, uses anti-analysis techniques and calls in a system fingerprinting module.
A newly discovered downloader malware has been discovered as part of a new campaign primarily targeting financial institutions.
Researchers at Proofpoint said today that the downloader – dubbed “Marap” after its command-and-control phone-home parameter, “param,” spelled backwards – is notable for its focused functionality and modular nature, as well as its ability to perform reconnaissance through a systems-fingerprinting module.
“As defenses become more adept at catching commodity malware, threat actors and malware authors continue to explore new approaches to increase effectiveness and decrease the footprint and inherent ‘noisiness’ of the malware they distribute,” researchers said in Thursday’s post about the new malware.
On August 10, researchers began to notice several large email campaigns consisting of “millions of messages” leading to the same Marap malware payload.
The emails contained a variety of attachment types, including Microsoft Excel Web Query (“.iqy”) files, password-protected ZIP archives containing “.iqy” files, PDF documents with embedded “.iqy” files and Microsoft Word documents containing macros.
Many of the campaigns would purport to be from the sales department, important documents from a major unnamed bank or invoices from a random display name (such as “netadmin@[random domain]”).
The email attachments contain malicious macros for executing the Marap malware, which is written in C and contains a few notable anti-analysis features, researchers said.
One of these features is API-hashing, a commonly used process in malware to prevent analysts and automated tools from determining the code’s purpose. The process means that most of the Windows API function calls are resolved at runtime using a hashing algorithm, which is this case appears to be custom to Marap, said researchers.
Secondly, the malware uses timing checks at the beginning of important functions, which can hinder debugging and sandboxing. “If the calculated sleep time is too short, the malware exits,” the researchers explained.
Finally, the malware compares the system’s MAC address to a list of virtual machine vendors – and if a virtual machine is detected and a configuration flag is set, the malware may also exit, researchers said.
Marap uses HTTP for its C&C communication (although first it tries a number of legitimate WinHTTP functions to determine whether it needs to use a proxy, and if so, what proxy to use).
After command execution, a response message can be sent back to the C&C, which includes the bot ID, command, command ID, flag controlling response type, command status code and response data.
Marap is modular and flexible, enabling bad actors to download other modules and payloads. The most notable observed add-on was a systems-fingerprinting module being sent over from the C&C — which is a DLL module — to gather and send back an array of information to the server.
That information includes username, domain name, hostname, IP address, language, country, Windows version, anti-virus software detected and a list of Microsoft .ost files.
Marap is indicative of malware becoming more flexible and adopting new tactics to help bad actors evade analysis and add new capabilities, researchers at Proofpoint said: “This new downloader… points to a growing trend of small, versatile malware that give actors flexibility to launch future attacks and identify systems of interest that may lend themselves to more significant compromise.”
- Information Security Manager- Global Sporting Brand. UK. £100,000
REFCH8265 Identifier Project Information Security Manager- Global Sporting Brand. UK. £100,000 A unique and exclusive opportunity to DCL Search to provide leadership and guidance Information and IT Security practices to one of the most recognised sporting brands in the world. You will be the envy of your colleagues, friends and peers as you take the lead in developing and implementing a security strategy. You must have a blend of knowledge across information security and technical security and be able to build internal and external stakeholder relationships. To coin a well known phrase, you should be a player manager. You don’t need to be currently hands on configuring firewalls, monitoring SIEM alerts, but maybe you have in the past. Ideally you will have come from a technical background as you will be closing be working with technical teams. Skills should include, but not be limited to: Managing / developing to Incident response plans. Information Security Risk Management / compliance. Security awareness Driving remediation plans to address vulnerabilities etc. Hybrid working. Up to £100,000 + benefits.
- Lead Information and Cyber Security Specialist, Financial Services. Exclusive to DCL Search
Consultative approach with experience engaging with internal stakeholders providing advice and guidance across information security policies and standards into projects and programmes. Risk identification / Assessment / Management across people and process. ISO27001. Open mindedness to take on projects and programmes that will involve advising, scoping, refining, improving technical security control relating to best practice. Preferred experience; PCI DSS ISA or consultative experience within security Payment card industry. Information Security / technical security controls within Financial Services. Risk Assessment / management across technical controls. Technical Security background. Experience within secure by design and the technical security controls relating to projects / programmes. iSO27001 Lead Implementer / Auditor. CISA, CISM, CISSP. 2 days a fortnight in London- or more if you want.. Hybrid reworking.
- Cyber Security Associate, Financial Services. Exclusive to DCL Search
Exclusive Cyber Security Associate needed within a forward thinking financial services business head quartered in London. DCL Search have been engaged on an Identifier Project to attract the very best cyber talent to this business. Influence the cyber security capability and direction within the business. Learn new skills working within a collaborative team. Grow as a security professional. ROLE Triaging and troubleshooting security alerts at a level 1 / level 2 capacity. Reviewing security change management requests. Managing and use of security tooling such as; Endpoint management Vulnerability management Patch management CASB Experience with the following tools is desirable. ZOHO Desktop Central (Endpoint Management) Splunk (SIEM) Qualys CASB (Microsoft) Microsoft Azure Varonis DatAdvantage ADAudit Plus Sonicwall, Paloalto, Dark Trace, Cloudflare, Cisco Umbrella, Microsoft defender.
- Senior Cyber Security Engineer, Financial Services. Exclusive to DCL Search
Exclusive Senior Cyber Security Engineer needed within a forward thinking financial services business head quartered in London. DCL Search have been engaged on an Identifier Project to attract the very best cyber talent to this business. Influence the cyber security capability and direction within the business. Learn new skills working within a collaborative team. Grow as a security professional. ROLE Day to day operations, management and scalability of existing cyber security systems Managing of and maturing security tooling such as; SIEM Endpoint Management Firewall Patch Management CASB Vulnerability management. Triaging and troubleshooting security alerts. Improve tooling, reducing false positives. Reviewing, approving, escalating security change management requests. Implementing new cyber security systems. Ideal technical experience · Vulnerability Management: Qualys · Endpoint Management: ZOHO Desktop Central · Forcepoint: CASB, DLP, webs security, email security. · SIEM (Splunk) · Firewalls: Sonicwall, Palo Alto · Endpoint Microsoft Defender · Appreciation of ISO27001, GDPR, PCI, etc 2 days a fortnight in London- or more if you want.. Hybrid reworking.