{"id":8342,"date":"2015-07-03T23:54:17","date_gmt":"2015-07-04T02:54:17","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=8342"},"modified":"2019-06-18T17:22:43","modified_gmt":"2019-06-18T20:22:43","slug":"matsnu-descoberto-novo-malware","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2015\/07\/exploits\/matsnu-descoberto-novo-malware\/","title":{"rendered":"Matsnu &#8211; Novo Malware !!!"},"content":{"rendered":"<p style=\"text-align: justify;\">Ol\u00e1 pessoal !!! Sejam bem-vindos ao site Ethical Hacker !!!<\/p>\n<p style=\"text-align: justify;\"><span id=\"result_box\" lang=\"pt\"><span title=\"Check Point researcher Stanislav Skuratovich recently discovered a new malware called \u201cMatsnu\u201d, an x86 infector that acts as a backdoor after it infiltrates a computer system.\">Pesquisador Stanislav Skuratovich recentemente descobriu um novo malware chamado de &#8220;Matsnu&#8221;, um infec\u00e7\u00e3o de arquitetura de x86, que atua como um backdoor, ap\u00f3s ele se infiltrar em um sistema de computador. <\/span><span title=\"This malware could potentially upload and execute any file types on a system, allowing the attacker is able to execute files could, for example, encrypt files on disc or steal sensitive data.&lt;\/p&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt; &lt;p&gt;\">Este malware pode carregar e executar qualquer tipo de arquivo em um sistema, permitindo que o invasor seja capaz de executar arquivos que poderiam, por exemplo, criptografar arquivos em disco ou roubar dados confidenciais.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"The malware author(s) used a technique called DGA (Domain Generation Algorithm) to communicate with the C&amp;C server, protecting the malware image from any attempted string dumping, blacklisting dumped domains, or shutting down domains.\">Os desenvolvedores do malware utilizaram uma t\u00e9cnica chamada DGA (Domain Generation Algorithm) para se comunicar com o servidor C &amp; C, protegendo a imagem malware de qualquer tentativa de cadeia dumping, lista negra para despejo de dom\u00ednios, ou para desligar dom\u00ednios. O <\/span><span title=\"DGA makes blocking malicious network activities more difficult, because new domains are generated for specified amounts of time.\">DGA deixa o\u00a0 bloqueio de atividades de rede maliciosas mais dif\u00edcil, porque novos dom\u00ednios s\u00e3o gerados para quantidades de tempo espec\u00edficos. <\/span><span title=\"Matsnu has a number of anti-disassembling features and packing techniques which make the analysis process more challenging.&lt;\/p&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt; &lt;p&gt;\">Matsnu tem um certo n\u00famero de\u00a0anti-disassembling e caracter\u00edsticas t\u00e9cnicas que tornam o processo de an\u00e1lise mais desafiador envolvendo o pacote.<\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"To generate domains, the malware uses two predefined dictionaries, a few constants and variables, and the number of days since the epoch.\">Para gerar dom\u00ednios, o malware utiliza dois dicion\u00e1rios predefinidos, algumas constantes e vari\u00e1veis, e o n\u00famero de dias, desde a \u00e9poca. <\/span><span title=\"Domains are generated for the current day as well as the previous two days, and encrypted for later use.\">Dom\u00ednios s\u00e3o gerados para o dia atual, bem como os dois dias anteriores, e criptografado para uso posterior. <\/span><span title=\"The malware tries to connect the hardcoded domains and the domains generated for the current and previous two days.&lt;\/p&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt;&lt;br \/&gt; &lt;p&gt;\">O malware tenta ligar os dom\u00ednios codificados e os dom\u00ednios gerados para os atuais e dois dias anteriores.<\/span><\/p>\n<p style=\"text-align: justify;\"><span title=\"For a full analysis of the Matsu malware, please view the full report here.\">Para uma an\u00e1lise completa do malware Matsu, por favor, verificar o relat\u00f3rio completo no link a seguir:<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\"><a title=\"Matsnu\" href=\"http:\/\/blog.checkpoint.com\/wp-content\/uploads\/2015\/07\/matsnu-malwareid-technical-brief.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blog.checkpoint.com\/wp-content\/uploads\/2015\/07\/matsnu-malwareid-technical-brief.pdf<\/a><\/p>\n<p style=\"text-align: justify;\">Fonte: <a title=\"Malware Matsnu\" href=\"http:\/\/blog.checkpoint.com\/2015\/07\/02\/matsnu-a-new-malware-discovery\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/blog.checkpoint.com\/2015\/07\/02\/matsnu-a-new-malware-discovery\/<\/a><\/p>\n<p style=\"text-align: justify;\">Um grande abra\u00e7o a todos !!!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ol\u00e1 pessoal !!! Sejam bem-vindos ao site Ethical Hacker !!! Pesquisador Stanislav Skuratovich recentemente descobriu um novo malware chamado de &#8220;Matsnu&#8221;, um infec\u00e7\u00e3o de arquitetura de x86, que atua como um backdoor, ap\u00f3s ele se infiltrar em um sistema de computador. Este malware pode carregar e executar qualquer tipo de arquivo em um sistema, permitindo [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8343,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21,105,99],"tags":[],"class_list":["post-8342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits","category-noticias","category-novidades"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=8342"}],"version-history":[{"count":14,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8342\/revisions"}],"predecessor-version":[{"id":10349,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/8342\/revisions\/10349"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/8343"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=8342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=8342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=8342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}