Ursnif Malware Family Identified by Intezer Analyze - Intezer

Verifying Code Reuse Between Ursnif and 'Brexit' Malware Campaign Targeting the United Kingdom

Written by Intezer

    Email
    Join our free community
    Get started
    Share Article
    FacebookTwitterLinkedIn

    Top Blogs

    Today My Online Security published research describing a fairly large Ursnif campaign targeting the United Kingdom. The threat actors behind the attack are using Brexit as a topical lure to attract potential phishing candidates, with emails mentioning Brexit in the subject line linking to a google document that downloads the malware file.

    On Twitter a user by the name of craT0x (@justmlwhunting) published the payload of this malware sample. We took the payload from the researcher’s tweet and performed an analysis on our Genetic Malware Analysis tool, Intezer Analyze, to see if we could confirm that the payload shares code with previously seen Ursnif samples.

    Intezer Analyze detected the payload as malicious and classified it as a member of the Ursnif malware family. As you can see below, the payload shares 22 genes and 12 strings with previous Ursnif samples.

    https://analyze.intezer.com/#/analyses/d2f9c2bb-9106-462c-8f60-9923b7870f38

    Intezer Analyze

    Identifying patterns in code reuse is an effective way to accurately detect and classify malware. Try Intezer Analyze today. Users of the free community edition can upload up to 10 files per day to identify code reuse to trusted and malicious software and gain insights about malware families and threat actors.

    Intezer

    Track the latest malware variants and threat actors analyze.intezer.com

    © Intezer.com 2022 All rights reserved
    Analyze malware and unknown files for freeAnalyze malware for free analyze.intezer.com