{"id":108,"date":"2022-03-20T10:30:38","date_gmt":"2022-03-20T06:30:38","guid":{"rendered":"https:\/\/demo.dedote.com\/cyberdisti\/?p=108"},"modified":"2022-06-03T16:42:22","modified_gmt":"2022-06-03T12:42:22","slug":"top-malware","status":"publish","type":"post","link":"https:\/\/demo.dedote.com\/cyberdisti\/2022\/03\/20\/top-malware\/","title":{"rendered":"Top Malware(s)"},"content":{"rendered":"<h1><span style=\"color: #000080;\">Threat Hunting Journal May 2022 Edition<\/span><\/h1>\n<p><strong><span style=\"color: #ff0000;\">Top Malware(s) Detections: 1st of May \u2013 27th of May<\/span><\/strong><\/p>\n<p>Heimdal\u2122 returns with the May edition of our threat hunting journal. As you might have expected, king trojan reigns unhindered with over 16,000 positive detections. There are a couple of newcomers, some of which may give our uncrowned monarch a run for his money. Stick around for more information and goodies. Enjoy!<\/p>\n<h2>Top Malware(s) Detections: 1st of May \u2013 27<sup>th<\/sup>\u00a0of May<\/h2>\n<p>Throughout May, Heimdal\u2122\u2019s SOC team has detected 16 trojan variants, with a grand total of 16,738 positive detections \u2013 a 55.19% drop compared to April, when the historical high of 25,976 positive detections was recorded. Concerning distribution, we have 11 new newcomers and 20 backsliders. TR\/Rozena\/jrrvz raked the highest number of positive IDs (i.e., 2675), followed closely by TR\/CoinMiner.uwtyu with 2316 positive IDs, and EXP\/MS04-028.JPEG.A with 2280 hits. Here\u2019s the full list of May detections.<\/p>\n<table id=\"tablepress-35\" class=\"tablepress tablepress-id-35\">\n<thead>\n<tr class=\"row-1 odd\">\n<th class=\"column-1\">Malware Name<\/th>\n<th class=\"column-2\">Positive Detections<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n<td class=\"column-1\">TR\/Rozena.jrrvz<\/td>\n<td class=\"column-2\">2675<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n<td class=\"column-1\">TR\/CoinMiner.uwtyu<\/td>\n<td class=\"column-2\">2316<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n<td class=\"column-1\">EXP\/MS04-028.JPEG.A<\/td>\n<td class=\"column-2\">2280<\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n<td class=\"column-1\">TR\/Rozena.rfuus<\/td>\n<td class=\"column-2\">1635<\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n<td class=\"column-1\">TR\/Trash.Gen<\/td>\n<td class=\"column-2\">1600<\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n<td class=\"column-1\">TR\/Patched.Gen<\/td>\n<td class=\"column-2\">1439<\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n<td class=\"column-1\">TR\/AD.GoCloudnet.kabtg<\/td>\n<td class=\"column-2\">1398<\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n<td class=\"column-1\">EXP\/CVE-2010-2568.A<\/td>\n<td class=\"column-2\">969<\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n<td class=\"column-1\">TR\/Downloader.Gen<\/td>\n<td class=\"column-2\">958<\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n<td class=\"column-1\">TR\/CoinMiner.wmstw<\/td>\n<td class=\"column-2\">919<\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n<td class=\"column-1\">TR\/PSInject.G1<\/td>\n<td class=\"column-2\">916<\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n<td class=\"column-1\">VBS\/Dldr.Agent.VPET<\/td>\n<td class=\"column-2\">801<\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n<td class=\"column-1\">W32\/Run.Ramnit.C<\/td>\n<td class=\"column-2\">778<\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n<td class=\"column-1\">TR\/Dropper.Gen<\/td>\n<td class=\"column-2\">754<\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n<td class=\"column-1\">ACAD\/Bursted.AN<\/td>\n<td class=\"column-2\">698<\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n<td class=\"column-1\">TR\/Crypt.XPACK.Gen<\/td>\n<td class=\"column-2\">667<\/td>\n<\/tr>\n<tr class=\"row-18 even\">\n<td class=\"column-1\">TR\/AD.Swotter.lckuu<\/td>\n<td class=\"column-2\">512<\/td>\n<\/tr>\n<tr class=\"row-19 odd\">\n<td class=\"column-1\">W32\/Floxif.hdc<\/td>\n<td class=\"column-2\">437<\/td>\n<\/tr>\n<tr class=\"row-20 even\">\n<td class=\"column-1\">ADWARE\/ANDR.Boomp.FJAM.Gen<\/td>\n<td class=\"column-2\">383<\/td>\n<\/tr>\n<tr class=\"row-21 odd\">\n<td class=\"column-1\">ACAD\/Burste.K<\/td>\n<td class=\"column-2\">308<\/td>\n<\/tr>\n<tr class=\"row-22 even\">\n<td class=\"column-1\">TR\/Crypt.XPACK.Gen2<\/td>\n<td class=\"column-2\">295<\/td>\n<\/tr>\n<tr class=\"row-23 odd\">\n<td class=\"column-1\">TR\/Dropper.Gen5<\/td>\n<td class=\"column-2\">269<\/td>\n<\/tr>\n<tr class=\"row-24 even\">\n<td class=\"column-1\">W32\/Chir.B<\/td>\n<td class=\"column-2\">265<\/td>\n<\/tr>\n<tr class=\"row-25 odd\">\n<td class=\"column-1\">WORM\/Brontok.C<\/td>\n<td class=\"column-2\">224<\/td>\n<\/tr>\n<tr class=\"row-26 even\">\n<td class=\"column-1\">W32\/Sality.Y<\/td>\n<td class=\"column-2\">214<\/td>\n<\/tr>\n<tr class=\"row-27 odd\">\n<td class=\"column-1\">ADWARE\/JsPopunder.G<\/td>\n<td class=\"column-2\">199<\/td>\n<\/tr>\n<tr class=\"row-28 even\">\n<td class=\"column-1\">W32\/Parite<\/td>\n<td class=\"column-2\">199<\/td>\n<\/tr>\n<tr class=\"row-29 odd\">\n<td class=\"column-1\">TR\/AD.Swotter.fgqir<\/td>\n<td class=\"column-2\">195<\/td>\n<\/tr>\n<tr class=\"row-30 even\">\n<td class=\"column-1\">TR\/Dropper.tfflr<\/td>\n<td class=\"column-2\">190<\/td>\n<\/tr>\n<tr class=\"row-31 odd\">\n<td class=\"column-1\">EXP\/PyShellCode.G<\/td>\n<td class=\"column-2\">182<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Top 10 Malware Detailed<\/strong><\/h2>\n<p>Let\u2019s get around to covering those new detections.<\/p>\n<h3>TR\/Trash.Gen<\/h3>\n<p>TR\/Trash.Gen is trojan-type malware that\u2019s usually contracted by visiting unsecured pornographic websites. Trash.Gen can install backdoors, ramp up CPU usage, and install adware.<\/p>\n<h3>TR\/PSInject.G1<\/h3>\n<p>PSInject.G1 is PowerShell scrip-carrying trojan that accesses multiple comdlets such are new-object, out-null, test-path, where-object, write-output, and write-verbose.<\/p>\n<h3>VBS\/Dldr.Agent.VPET<\/h3>\n<p>Dldr.Agent.VPET is a trojan downloader. It\u2019s used to inject and execute malicious VBS scripts on the victim\u2019s machine.<\/p>\n<h3>TR\/AD.Swotter.lckuu<\/h3>\n<p>An adware-carrying trojan is used to collect host and network data from the infected machine.<\/p>\n<h3>ACAD\/Burste.K<\/h3>\n<p>A \u2018trojanized\u2019 virus that affects ACAD .lsp files. Upon infection, the virus waits for user input in order to load the files.<\/p>\n<h3>TR\/Dropper.Gen5<\/h3>\n<p>A trojan dropper used to install backdoors, deliver additional malware components or to eavesdrop on the victim.<\/p>\n<h3>WORM\/Brontok.C<\/h3>\n<p>The .C variant of the Brontok worm. This malware\u2019s distributed via email. Once inside the machine, it will create a new Windows Registry entry, disable regedit.exe, and modify several Windows Explorer settings.<\/p>\n<h3>W32\/Sality.Y<\/h3>\n<p>The .Y variant of the Sality virus is used to install backdoors or connect the victim\u2019s computer to a botnet.<\/p>\n<h3>ADWARE\/JsPopunder.G<\/h3>\n<p>An adware-type malware. Can display malicious popups or ads on the affected machine.<\/p>\n<h2><strong>Additional Cybersecurity Tips and Parting Thoughts<\/strong><\/h2>\n<p>This concludes the May edition of Heimdal\u2122 Security\u2019s threat hunting journal. Before I go, I\u2019m gonna share with you a couple of tips on how you can jog up your security.<\/p>\n<ul>\n<li><strong>Scanning frequency<\/strong>. Don\u2019t have any type of device-scanning policy in place? Well, now would be a good time to enforce one.<\/li>\n<li><strong>Better AV protection.<\/strong>\u00a0Some types of malware won\u2019t show up on a regular AV scan. If so, I would encourage you to try out\u00a0<a href=\"https:\/\/heimdalsecurity.com\/enterprise-security\/products\/endpoint-antivirus\" target=\"_blank\" rel=\"noopener\"><strong>Heimdal\u2122 Next-Gen AV &amp; MDM<\/strong><\/a>, a solution than combines top-tier detection rates, brute-force detection &amp; protection features, and more.<\/li>\n<li><strong>Phishing<\/strong>. As you know, most malware\u2019s transmitted via email. So, if it looks suspicious, it\u2019s probably dangerous and should, therefore, not be opened.<\/li>\n<\/ul>\n<p>If you liked this article, follow us on\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/heimdal-security\/\"><strong>LinkedIn<\/strong><\/a>,\u00a0<a href=\"https:\/\/twitter.com\/HeimdalSecurity?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\"><strong>Twitter<\/strong><\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/HeimdalSec\/\"><strong>Facebook<\/strong><\/a>,\u00a0<a href=\"https:\/\/www.youtube.com\/c\/Heimdalsecuritycompany\"><strong>Youtube<\/strong><\/a>, and\u00a0<a href=\"https:\/\/www.instagram.com\/heimdalsecurity\/?hl=en\"><strong>Instagram<\/strong><\/a>\u00a0for more cybersecurity news and topics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat Hunting Journal May 2022 Edition Top Malware(s) Detections: 1st of May \u2013 27th of May Heimdal\u2122 returns with the May edition of our threat hunting journal. As you might&#8230;<\/p>\n","protected":false},"author":1,"featured_media":110,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":3,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/108\/revisions"}],"predecessor-version":[{"id":1325,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/posts\/108\/revisions\/1325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media\/110"}],"wp:attachment":[{"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/media?parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/categories?post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/demo.dedote.com\/cyberdisti\/wp-json\/wp\/v2\/tags?post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}