An Update on the UrlZone Banker
UrlZone is a banking trojan that appeared in 2009. Searching its name or one of its aliases (Bebloh or Shiotob) reveals a good deal of press from that time period along with a few technical analyses in 2009 [1] [2], 2012 [3], and 2013 [4]. Despite having a reputation of evolution, there doesn’t seem to be very many recent updates on this malware family though. Is UrlZone still a threat and if so, how has it changed?
To explore that, this post takes a look at a recent UrlZone malware sample to see if it is still an active threat. It then gives an update on the command and control (C2) communications as they have changed since being previously documented. These are then put together in some proof of concept code that downloads and decrypts the webinject configuration file (the bread and butter of any banker malware) to see what financial institutions are being targeted.
Sample
The sample analyzed for this post has an MD5 of:
01fd0f1ad59ad5403c9507bfb625fe0c
For the “stop using md5 now” converts, it has the following SHA256:
39bbde33922cd6366d7c2a252c4aadd4dfd7405d5271e3652940a7494b885e88
The sample’s compilation date is 2015-06-12 12:01:03. This date seems legit as Continue reading