Highly Flexible Marap Malware Enters the Financial Scene
A new downloader, which has been spotted in an array of recent email campaigns, uses anti-analysis techniques and calls in a system fingerprinting module.
A newly discovered downloader malware has been discovered as part of a new campaign primarily targeting financial institutions.
Researchers at Proofpoint said today that the downloader – dubbed “Marap” after its command-and-control phone-home parameter, “param,” spelled backwards – is notable for its focused functionality and modular nature, as well as its ability to perform reconnaissance through a systems-fingerprinting module.
“As defenses become more adept at catching commodity malware, threat actors and malware authors continue to explore new approaches to increase effectiveness and decrease the footprint and inherent ‘noisiness’ of the malware they distribute,” researchers said in Thursday’s post about the new malware.
On August 10, researchers began to notice several large email campaigns consisting of “millions of messages” leading to the same Marap malware payload.
The emails contained a variety of attachment types, including Microsoft Excel Web Query (“.iqy”) files, password-protected ZIP archives containing “.iqy” files, PDF documents with embedded “.iqy” files and Microsoft Word documents containing macros.
Many of the campaigns would purport to be from the sales department, important documents from a major unnamed bank or invoices from a random display name (such as “netadmin@[random domain]”).
The email attachments contain malicious macros for executing the Marap malware, which is written in C and contains a few notable anti-analysis features, researchers said.
One of these features is API-hashing, a commonly used process in malware to prevent analysts and automated tools from determining the code’s purpose. The process means that most of the Windows API function calls are resolved at runtime using a hashing algorithm, which is this case appears to be custom to Marap, said researchers.
Secondly, the malware uses timing checks at the beginning of important functions, which can hinder debugging and sandboxing. “If the calculated sleep time is too short, the malware exits,” the researchers explained.
Finally, the malware compares the system’s MAC address to a list of virtual machine vendors – and if a virtual machine is detected and a configuration flag is set, the malware may also exit, researchers said.
Marap uses HTTP for its C&C communication (although first it tries a number of legitimate WinHTTP functions to determine whether it needs to use a proxy, and if so, what proxy to use).
After command execution, a response message can be sent back to the C&C, which includes the bot ID, command, command ID, flag controlling response type, command status code and response data.
Marap is modular and flexible, enabling bad actors to download other modules and payloads. The most notable observed add-on was a systems-fingerprinting module being sent over from the C&C — which is a DLL module — to gather and send back an array of information to the server.
That information includes username, domain name, hostname, IP address, language, country, Windows version, anti-virus software detected and a list of Microsoft .ost files.
Marap is indicative of malware becoming more flexible and adopting new tactics to help bad actors evade analysis and add new capabilities, researchers at Proofpoint said: “This new downloader… points to a growing trend of small, versatile malware that give actors flexibility to launch future attacks and identify systems of interest that may lend themselves to more significant compromise.”
- Google Cloud Data Engineer
- Up to £90,000 Base
Google Cloud Data Engineer London Salary: Up to £90,000 Base We are currently working with a leading Google Cloud partner who are currently looking for a Google Cloud Data Engineer in London. The Google Cloud Data Engineer will be responsible for projects designing and implementing data cataloguing platforms using Google Cloud. Current Experience Required: Google Cloud (MUST be Google Cloud Professional Engineer Certified and worked on recent GCP/Google Cloud Projects). Data Analytics (Data Engineering, Data Mining, Data Cataloguing etc.) Cloud PUB / SUB Candidates must be UK based and commutable to London. Candidates outside of the EU can not be sponsored Apply for more information or call Peter Georgiou on 02086634030. Ref: PG7692
- Microsoft Azure Sales Consultant
- Up to £100,000 Base + OTE
DCL are currently working on behalf one of the fastest growing service providers in London who are on the lookout for a consultative Microsoft Azure Sales Consultant. The Microsoft Azure Sales Consultant will be responsible for selling (opening and closing new business opportunities new business) and being the SME in all things Cloud providing support to other members in the sales team. Preference will be given to the Microsoft Azure Sales Consultant who possesses Exceptional knowledge of Cloud Technology (Public / Private / Hybrid.). Current experience with technology such as Azure, AWS, Office 365 is required Proven sales experience of identifying and closing new business within the Cloud market. Must be currently selling into the enterprise market. Consistency on tenure in current and past roles. New business background is a must In return you will be working for a successful, growing SME organisation with excellent training and sales support from pre-sales, post-sales, project management, service management, bid management, pricing and customer service. Candidates must be UK Based. sponsorship can not be provided for this role. Reference Number: BD7690 (Cloud Sales Jobs, Cloud Computing Jobs, Cloud Computing Sales)
- Senior Incident Cyber Response Consultant
- Up to £75,000 Base
Senior Incident Cyber Response Consultant with Forensic experience is needed to join a global consultancy whose cyber business unit are continuing to their investment in the growth of their team. From my perspective, as a recruitment partner, this is a particularly interesting and exciting opportunity. Not only is the team in an active growth mode, but they have varied, high profile and interesting projects for their team. Globally recognised. This is an opportunity to drive and grow a career. Experienced Senior Incident Cyber Response Consultant is needed to help take clients through the complete IR / triage process. The position is be client facing and will be expected to engage with clients at a commercial level. Proactive IR planning is also key to the position. The Senior Incident Cyber Response Consultant will not hold a sales target, but any previous experience in identifying and generating revenue is highly sort after. A broad forensic background would be highly desirable also. An ideal Senior Incident Cyber Response Consultant will be CREST CCIR, CCIM certified. Experience with forensics is highly desirable. Any of the following are very desirable also CREST Certified Network Intrusion Analyst (CCNIA) CREST Certified Host Intrusion Analyst (CCHIA) CREST Certified Malware Reverse Engineer (CCMRE) CREST Practitioner Intrusion Analyst (CPIA) An individual must be London commutable Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) The opportunity for an individual to conduct malware research and analysis is actively promoted. Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 or 02086634030 or email firstname.lastname@example.org Unfortunately, our client are unable to provide sponsorship for this opportunity. Candidates must be UK based. Ref: CH7679 (Incident Response Jobs, CREST Jobs, Digital Forensics Jobs, IR Jobs)
- Principal Electrical Engineer
- Salary: Up to £90,000 Base + Bonus
Principal Electrical Engineer Location: London Salary: Up to £90,000 Base + Bonus A Principal Electrical Engineer is needed for a state of the art, London based Data Centre provider. The Principal Electrical Engineer will be responsible for all of the Mechanical & Electrical components (support, development/design etc.) within our clients Data Centre’s. Other responsibilities include but not limited to; Commissioning, approving, design & review/improvement of new data centre infrastructure Commercial’s (Contract negotiation, project finances etc.) Project management Training/Development of other staff General engineering tasks Requirements HND / Degree in Engineering or equivalent. Must have current/recent experience (ideally in a senior position) within a mechanical & electrical position within a Data Centre environment Candidates must be UK based and unfortunately, our client are unable to provide sponsorship Ref: PG7600 (M&E Jobs, Mechanical & Electrical Jobs, Engineering Jobs, Data Centre Jobs, Data Center Jobs)