The Update You Can’t Afford to Skip: End of Support for Office 2016 & Office 2019

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Threat Analysis Series: Top Malware Review

By OPSWAT
Share this Post

We recently released a list of the most commonly searched-for threats on Metascan Online. This post will use the information on that page to further our threat research.

Virus icon orange

One of the difficulties we had in putting together a list of the most searched-for threats on Metascan Online was determining how to label the threats. Malware naming can often be different across anti-malware vendors and thus it can be difficult to compare results for a particular threat. In addition, a casual observer may not be able to gather additional information about the threat simply by looking at its name. To help make sense of the list of common threats we put together on Metascan Online, we went ahead and did the work for you. We looked at the top 10 threats and compiled additional details about them so they're easier to analyze and understand.

Threat Naming Standards

While there is no standard naming convention for malware in the industry, there are some generally-used naming standards across vendors, such as the platform the malware is designed to run on, the type of malware it is categorized as, or the malware family it belongs to. Here are a few examples, taken from the Upatre outbreak mentioned in a previous post:

  • TrojanDownloader:Win32/Upatre
  • TrojanDownloader.Upatre.r3
  • Trojan-Downloader.Win32.Upatre.eyl

If you want to see a few examples of the threat naming process for different anti-malware vendors, you can take a look at the resources below:

  1. http://www.caro.org/articles/naming.html
  2. http://www.microsoft.com/security/portal/mmpc/shared/malwarenaming.aspx
  3. https://support.avira.com/hc/en-us

Threat naming conventions are usually specific to a particular anti-malware vendor (with the exception of CARO which takes a more holistic approach). Because of this variation, we went ahead and made things simpler, by providing a more readable way of showing the threats. The data is summarized using a collection of sources listed at the end of this post.

Top 10 Searched Threats This Week

In order to learn more about the top searched threats this week, we selected a few threat names from engines that detected a threat and then searched for that threat online on various documented collections from anti-malware companies, blog posts, etc. From there, we went through the information in order to better understand threat descriptions and behavior. After reading this information, we were able to determine the threat type and severity. Links to the references we used are provided at the end of this post.

SHA256Threat NameType*Severity*Detection (out of 43 Engines)Action Performed

A84E4FAFFBFC886AE15E49CF4F38B21BC8F2354EF573B78FA0090E596B64981C

BlacoleTrojanSevere24Trojan that exploits a vulnerability in the Java Runtime Environment. Intended to steal information on computer (passwords, email, online accounts)
4BE24A10114ABCBB48060354BC4A989F40E6AF67FD4663B3836CB4F557FF2703MadangVirusSevere16Windows virus that infects .exe and .scr files
89E27DB4337FD500095AFA78A60FA9C794D44B99E270E0620606F617D1EB6378

DomalQ

PUPMedium31Windows PUP (Adware) that installs software, displays popups, etc.
B7B2229140124DA77DB2A76CBD936CBD0AD9F96B159298B5037FC6C9A90841CFInstallRexPUPMedium28PUP that contains adware and installs toolbars
3C85BF3A590AB4D7DAB0975C8954E63AA3352CFEEFFF2CAA41A1EF4D438E4544InstallCorePUPMedium17Software that installs additional unwanted software (such as advertisements, toolbars, etc.)
9329CE85946F4767BD79876C68E54FDAD031AD7ADD64DADE71F8E9E49EF11424
BlacoleTrojanSevere21Trojan that attempts to infect PC with other Trojans and viruses
E8ADA92EE32A1754FD9EEA920A6D192D5811FAFB6C3F239C484AB9FB80582512RamnitVirusLow38Virus that downloads other malware. Creates a backdoor.
E5AC415C65B8ED457F978325818402345DA3031BA04778D222C634FC5FBE652EVobfusTrojanSereve36Trojan that infect files downloaded from the internet. This can also be considered worm-like behavior
87B1F4E69E239FB15B5F4EE42C8417C1FAC87A69DAE43E48DF807EB7D432E88DExpiroVirusSevere32Virus that infects files. It can allow a hacker to access the PC and steal stored user names and passwords
96D28209CB3A8AB704BF37AF4816F260D1042450A607D8BC4F2A3172124468D4

Online

Game

Password StealerSevere34Steals Passwords

Key Takeaways:

  • Viruses, Trojans, and PUPs (potentially unwanted programs) are the most prevalent in this list. In the case of PUPs, this can indicate how this category, while not specifically malware, is very prevalent on users' systems today.
  • Although only one Password Stealer made the top 10, the impact of a possible infection is still labeled as Severe
  • The majority of threats fall into the Severe category. Given that the majority of these hashes come from files that still exist on a users' system today demonstrates how widespread the particular threats are.
  • Although not shown in this chart, all 10 threats were first uploaded to Metascan Online over a year ago. Even after so much time has passed, these threats are still making a current appearance in files. This demonstrates that even old threats can be dangerous.

To check out more of the most-searched for threats on Metascan Online, visit the new statistics page.

This is the first post in an ongoing series covering the types of threats that we show in our list of most searched-for threats on Metascan Online. Check back for additional posts, or subscribe to our blog so that you won't miss upcoming research!

References:

1. Microsoft resource on Blacole Trojan

2. McAfee resource on Blacole Trojan

3. Malware Tips resource on Blacole Trojan

4. Microsoft resource on Madang Virus

5. ESET Resource on Mandang Virus

6. Microsoft resource on DomalQ PUP

7. Malware Tips resource on DomalQ PUP

8. Avira resource on DomalQ PUP

9. Sophos resource on InstallRex PUPInstallRex PUP

10. Malware Tips resource on InstallRex PUPInstallRex PUP

11. Sophos resource on InstallCore PUP

12. AVG resource on InstallCore PUP

13. AVG resource on InstallCore PUP

14. Microsoft resource on Blacole Trojan

15. F-Secure resource on Blacole Trojan

16. McAfee resource on Ramnit Virus

17. Microsoft resource on Ramnit Virus

18. Panda Security resource on Ramnit Virus

19. Microsoft resource on Vobfus Trojan

20. Lavasoft resource on Vobfus Trojan

21. Microsoft resource on Vobfus Trojan

22. Sophos resource on Expiro Virus

23. Microsoft resource on Expiro Virus

24. Microsoft resource on OnlineGame

Our second post in this series, Threat Analysis Series: Top Malware Review (Part II), is now available. Find out what the most recent top threats are!

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.