January 11, 2016 By Larry Loeb 2 min read

Researchers at security company Zscaler have found malware that uses compromised digital certificates to evade detection. Dubbed Spymel, it uses a .NET executable signed with a legitimate DigiCert-issued certificate. The malware allows malicious actors to steal information from compromised machines and spy on victims.

How Spymel Abuses Digital Certificates

Spymel is a Trojan that starts with JavaScript that is not obfuscated. This malware typically will show up via a spammed email. The executable, which is obfuscated, gets downloaded from a location hard-coded in the JavaScript.

“[The] .NET binary … is digitally signed with a certificate issued to SBO INVEST,” Zscaler researchers noted. “The certificate was promptly revoked by DigiCert when notified and, therefore, is not active in any attack. We noticed a newer variant arose within two weeks of the first variant, using another certificate issued to SBO INVEST that is also revoked.”

The configuration data, including command-and-control (C&C) servers as well as file and registry information, is hard-coded within the executable. The C&C server is hosted on the android.sh domain, which has a German IP address. The malware communicates via port 1216.

SecurityWeek reported that Spymel is designed to work on both Windows XP and Windows 7 systems.

Many Functions, All Invasive

There are several modules to Spymel. One is a keylogger, which is a module that logs all user keystrokes into a log file at %Application Data%\ProgramFiles(32.1)\svchost.exe.tmp.

Zscaler found that the C&C server may send a host of commands to infected machines. These include collecting information about the infected system and the files found on it, as well as deleting, executing or renaming a specified file. A specified file can be uploaded to the C&C and so can a screenshot of the desktop. Enabling or disabling video recording can also be performed.

A ProtectMe module allows Spymel to prevent the user from terminating the malware or run other processes. Tools such as TaskMgr, Procexp, ProcessHacker and Taskkill are disabled by making the OK button on the confirmation prompt for Process Explorer not appear as a valid choice. It does this by using the GetForegroundWindow() API to get a handle of the active window and change how it works.

Abuse of digital certificates has been a technique used by malware in the past. SecurityWeek noted that more than 6,000 cases of malware using certs was recording in 2014 alone.

More from

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today