Back to Resources

SentinelOne vs Zeus Sphinx banking trojan (COVID-19 SPAM)

Late in March, we observed the Sphinx banking trojan, which is largely based on leaked source code for Zeus, began to aggressively spread via email with COVID-themed messages. In some cases, victims were enticed to complete a form related to receiving government assistance during the outbreak. The malicious document then proceeds to drop and execute a VBS script. This script establishes C2 communication channels and downloads additional executable payloads. Beyond the COVID-themed lures, the functionally is largely unchanged with regards to data inception via web injects. #Zeus Sphinx attempts to establish persistence via the registry (HKLMSoftwareMicrosoftWindowsCurrentVersionRun). The malware has also been known to self-sign its binaries, in an attempt to further evade traditional endpoint security controls. Watch how SentinelOne blocks this threat.

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.