www.bleepingcomputer.com Open in urlscan Pro
104.20.60.209  Public Scan

URL: https://www.bleepingcomputer.com/news/security/new-mozart-malware-gets-commands-hides-traffic-using-dns/
Submission: On March 26 via api from US

Form analysis 6 forms found in the DOM

https://www.bleepingcomputer.com/search/

<form action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" placeholder="Search Site">
</form>

https://www.bleepingcomputer.com/search/

<form action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" placeholder="Search Site">
</form>

POST //bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&id=30c98e654e

<form action="//bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&amp;id=30c98e654e" method="post" target="_blank" novalidate="">
  <input type="email" name="EMAIL" placeholder="Email Address...">
  <div style="position: absolute; left: -5000px;"><input type="text" name="b_3e2b3b692f780cdff40d45346_30c98e654e" tabindex="-1" value=""></div>
  <input type="submit" value="Submit" class="bc_sub_btn">
</form>

POST //bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&id=30c98e654e

<form action="//bleepingcomputer.us10.list-manage.com/subscribe/post?u=3e2b3b692f780cdff40d45346&amp;id=30c98e654e" method="post" target="_blank" novalidate="">
  <input type="email" name="EMAIL" placeholder="Email Address...">
  <div style="position: absolute; left: -5000px;"><input type="text" name="b_3e2b3b692f780cdff40d45346_30c98e654e" tabindex="-1" value=""></div>
  <input type="submit" value="Submit" class="bc_sub_btn">
</form>

POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&do=process&return=https://www.bleepingcomputer.com/news/security/new-mozart-malware-gets-commands-hides-traffic-using-dns/

<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;do=process&amp;return=https://www.bleepingcomputer.com/news/security/new-mozart-malware-gets-commands-hides-traffic-using-dns/"
  method="post">
  <div class="bc_form_feild">
    <label for="ips_username">Username</label>
    <input type="text" id="ips_username" name="ips_username">
  </div>
  <div class="bc_form_feild">
    <label for="ips_password">Password</label>
    <input type="password" id="ips_password" name="ips_password">
  </div>
  <div class="bc_form_feild">
    <div class="bc_remember">
      <input id="remember" type="checkbox" name="rememberMe" value="None" checked="checked">
      <label for="remember"></label>
      <span>Remember Me</span>
    </div>
    <div class="bc_anon">
      <input id="anonymous" type="checkbox" name="anonymous" value="None">
      <label for="anonymous"></label>
      <span>Sign in anonymously</span>
    </div>
  </div>
  <div class="bc_btn_wrap">
    <input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
    <input type="submit" value="Login" class="bc_sub_btn">
    <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;serviceClick=twitter&amp;return=https://www.bleepingcomputer.com/news/security/new-mozart-malware-gets-commands-hides-traffic-using-dns/" class="bc_twitter_btn"><img src="https://www.bleepstatic.com/images/site/login/twitter.png" width="28" height="24" alt="Sign in with Twitter"> Sign in with Twitter</a>
    <hr>
    <p>Not a member yet? <a href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=register">Register Now</a></p>
  </div>
</form>

<form>
  <input type="hidden" id="comment-id-report" value="0">
  <ul>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Spam">Spam</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Abusive or Harmful">Abusive or Harmful</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Inappropriate content">Inappropriate content</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Strong language">Strong language</label>
    </li>
    <li>
      <label><input type="radio" name="comment-report-reason" value="Other">Other</label>
    </li>
    <li id="comment-report-other-reason-wrap" style="display:none;">
      <textarea rows="2" cols="2" id="comment-report-other-reason"></textarea>
    </li>
  </ul>
  <p><a href="https://www.bleepingcomputer.com/posting-guidelines/">Learn more</a> about what is not allowed to be posted.</p>
</form>

Text Content

We value your privacy

We and our partners use technologies, such as cookies, and process personal
data, such as IP addresses and cookie identifiers, to personalise ads and
content based on your interests, measure the performance of ads and content, and
derive insights about the audiences who saw ads and content. Click below to
consent to the use of this technology and the processing of your personal data
for these purposes. You can change your mind and change your consent choices at
any time by returning to this site.

MORE OPTIONS I accept
Change consent See Vendors

Powered by

 * 
 * 
 * 



 * 
 * 
 * 



 * News
    * Featured
    * Latest
   
    * Three More Ransomware Families Create Sites to Leak Stolen Data
   
    * HPE Warns of New Bug That Kills SSD Drives After 40,000 Hours
   
    * Microsoft Fixes Windows Defender Scan Bug With New Update
   
    * Google Chrome Adding Option to Always Show Full URLs
   
    * Get the Pay What You Want: Cisco Networking & Cloud Computing
      Certification Bundle Deal
   
    * Chinese Hackers Use Cisco, Citrix, Zoho Exploits In Targeted Attacks
   
    * WordPress Malware Distributed via Pirated Coronavirus Plugins
   
    * Google Chrome Adding Option to Always Show Full URLs

 * Downloads
    * Latest
    * Most Downloaded
   
    * STOPDecrypter
   
    * AuroraDecrypter
   
    * FilesLockerDecrypter
   
    * 360 Total Security
   
    * AdwCleaner
   
    * ComboFix
   
    * RKill
   
    * Junkware Removal Tool

 * Virus Removal Guides
    * Latest
    * Most Viewed
    * Ransomware
   
    * Remove the Srchus.xyz Search Redirect
   
    * Remove the Vitosc.xyz Search Redirect
   
    * Remove the Wisip Chrome Extension
   
    * Remove the Press Allow to watch the video Notification Page
   
    * Remove Security Tool and SecurityTool (Uninstall Guide)
   
    * How to remove Antivirus 2009 (Uninstall Instructions)
   
    * How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
   
    * How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using
      TDSSKiller
   
    * Locky Ransomware Information, Help Guide, and FAQ
   
    * CryptoLocker Ransomware Information Guide and FAQ
   
    * CryptorBit and HowDecrypt Information Guide and FAQ
   
    * CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ

 * Tutorials
    * Latest
    * Popular
   
    * How to Translate a Web Page in Google Chrome
   
    * How to Install and Uninstall Google Chrome in Windows
   
    * How to Disable Bing Search in the Windows 10 Start Menu
   
    * Fix a Missing VCRUNTIME140.dll DLL Error in Windows
   
    * How to start Windows in Safe Mode
   
    * How to remove a Trojan, Virus, Worm, or other Malware
   
    * How to show hidden files in Windows 7
   
    * How to see hidden files in Windows

 * Deals
    * Categories
   
    * eLearning
   
    * IT Certification Courses
   
    * Gear + Gadgets
   
    * Security

 * Forums
 * More
   * Startup Database
   * Uninstall Database
   * File Database
   * Glossary
   * Chat on Discord
   * Send us a Tip!
   * Welcome Guide


 * Home
 * News
 * Security
 * New Mozart Malware Gets Commands, Hides Traffic Using DNS

 * AddThis Sharing Buttons
   Share to FacebookFacebook192Share to TwitterTwitterShare to
   LinkedInLinkedInShare to RedditReddit56Share to Hacker NewsHacker NewsShare
   to EmailEmail
 *  


NEW MOZART MALWARE GETS COMMANDS, HIDES TRAFFIC USING DNS

By

LAWRENCE ABRAMS

 * February 24, 2020
 * 04:34 PM
 * 0

A new backdoor malware called Mozart is using the DNS protocol to communicate
with remote attackers to evade detection by security software and intrusion
detection systems.

Typically when a malware phones home to receive commands that should be
executed, it will do so over the HTTP/S protocols for ease of use and
communication.

Using HTTP/S communication to communicate, though, has its drawbacks as security
software normally monitors this traffic for malicious activity. If detected, the
security software will block the connection and the malware that performed the
HTTP/S request.


AD Quality Auto 360p 720p 1080p Top articles1/5READ MOREChinese Hackers Use
Cisco, Citrix, Zoho Exploits In Targeted Attacks


In the new Mozart backdoor discovered by MalwareHunterTeam, the malware uses DNS
to receive instructions from attackers and to evade detection.


USING DNS TXT RECORDS TO ISSUE COMMANDS

DNS is a name resolution protocol that is used to convert a hostname, such as
www.example.com, to its IP addresses, 93.184.216.34, so that software can
connect to the remote computer.

In addition to converting hostnames to IP address, the DNS protocol also allows
you to query TXT records that contain text data.

This feature is commonly used for domain ownership verification for online
services and email security policies such as Sender Policy Framework or DMARC.

You can also use these for silly little demonstrations like the TXT record for
'hi.bleepingcomputer.com'.

hi.bleepingcomputer.com TXT record

The Mozart attackers are using these DNS TXT records to store commands that are
retrieved by the malware and executed on the infected computer.


MOZART MAKES BAD MUSIC OVER DNS

The Mozart malware is believed to be distributed via phishing emails that
contain PDFs that link to a ZIP file that was located at
https://masikini[.]com/CarlitoRegular[.]zip.

This zip file contains a JScript file that when executed will extract a base64
encoded executable that is saved to the computer as %Temp%\calc.exe and
executed.

Mozart Jscript installer


According to Head of SentinelLabs Vitali Kremez who analyzed this backdoor and
shared his findings with BleepingComputer, the malware will first check for the
file %Temp%\mozart.txt.

If it does not exist, it will create the file with the contents of '12345' and
perform some preparation work on the computer.

This includes copying the calc.exe file from the %Temp% folder to a random named
executable in the %AppData%\Microsoft\Windows\Start Menu\Programs\Startup\
folder to startup every time the victim logs into Windows.

mozart.txt file

According to Kremez, the Mozart malware will communicate with a hardcoded DNS
server under the attacker's control at 93[.]188[.]155[.]2 and issue following
DNS requests to receive instructions or configuration data:

The loader obtains the bot id and returns Base64-encoded parameters for tasks
and further processing:

A. ".getid" (.1)
The bot generation API sequence is as follows:
GetCurrentHwProfileW -> GetUserNameW -> LookupAccountNameW ->
ConvertSidToStringSidW 

B. ".gettasks" (.1)
Parse tasks with "," delimiter

C.".gettasksize" (.1)
Allocate memory for the task and dnsquery_call

D. ".gettask" (.1)
Parse for the specific task

E. ".reporttask" (.0|.1)
Run the task via CreateProcessW API

F. ".reportupdates" (.0|.1)
Retrieve and check updates via WriteFile and MoveFilW locally for a stored check
as ".txt"

H. ".getupdates" (.0|.1)
Check for presence of ".txt" update and write the update with "wb" flag and
check for executable extension (".exe") following with ".gettasks" call.

For example, in BleepingComputer's tests, we were assigned the bot of ID '111',
which caused Mozart to do DNS TXT lookups for 111.1.getid, 111.1.getupdates, and
111.1.gettasks.

gettasks DNS request

While monitoring Mozart, we noticed that the malware will continually issue
'gettasks' queries to the attacker's DNS server to find commands to execute.

If the TXT record response is empty, as shown above, that means there are no
commands to execute and the malware will continue to perform this check over and
over until a task is provided.

At this time, it is not known what commands are being executed by Mozart as
tests by myself and Kremez did not result in any responses to the DNS queries.

It could be that we did not test for a long enough period or the attackers are
currently in the process of building their botnet before transmitting commands.


BLOCKING THIS TYPE OF THREAT

It is important to note that malware using DNS to communicate is not unique to
the Mozart backdoor.

In 2017, the Cisco Talos group discovered a malware called DNSMessenger that was
also using TXT records for malicious communication.

To block Mozart, we could tell you to block DNS requests to 93[.]188[.]155[.]2,
but new variants could simply switch to a new DNS server until we get tired of
this cat-and-mouse game.



David Maxwell, Software Security Director at BlueCat, offered this suggestion
instead:

""At your firewall, block outbound port 53 from everywhere except your official
internal DNS server" - this virus goes directly to a fixed external IP, and
while you could just block that, the next virus won't use the same IP. Forcing
all of your corporate name resolution to go through the resolvers you maintain
gives you the ability to monitor traffic and control policy."

It is also important to keep an eye out for novel methods of malicious
communication and if your security software and intrusion systems can monitor
DNS TXT queries, you should enable it.


RELATED ARTICLES:

Malware Disguised as Google Updates Pushed via Hacked News Sites

Fake Corona Antivirus Software Used to Install Backdoor Malware

Attackers Deliver Malware via Fake Website Certificate Errors

Chinese Hackers Use New Malware to Backdoor Microsoft SQL Servers

Winnti Group Uses New PortReuse Malware Against Asian Manufacturer


 * Backdoor
 * Command and Control
 * DNS
 * Malware
 * Mozart

 * Facebook
 * Twitter
 * 
 * LinkedIn

 * Email
 * 



LAWRENCE ABRAMS

Lawrence Abrams is the creator and owner of BleepingComputer.com. Lawrence's
area of expertise includes malware removal and computer forensics. Lawrence
Abrams is a co-author of the Winternals Defragmentation, Recovery, and
Administration Field Guide and the technical editor for Rootkits for Dummies.
 * Previous Article
 * Next Article

POST A COMMENT COMMUNITY RULES

YOU NEED TO LOGIN IN ORDER TO POST A COMMENT

Not a member yet? Register Now


YOU MAY ALSO LIKE:

Popular Stories

 * HPE Warns of New Bug That Kills SSD Drives After 40,000 Hours

 * Windows 10 Optional Cumulative Update KB4541335 Released



NEWSLETTER SIGN UP

To receive periodic updates and news from BleepingComputer, please use the form
below.





NEWSLETTER SIGN UP


 * Follow us:
 * 
 * 
 * 
 * 

MAIN SECTIONS

 * News
 * Downloads
 * Virus Removal Guides
 * Tutorials
 * Startup Database
 * Uninstall Database
 * File Database
 * Glossary

COMMUNITY

 * Forums
 * Forum Rules
 * Chat

USEFUL RESOURCES

 * Welcome Guide
 * Sitemap

COMPANY

 * About BleepingComputer
 * Contact Us
 * Send us a Tip!
 * Advertising
 * Write for BleepingComputer
 * Social & Feeds
 * Changelog

Terms of Use - Privacy Policy

Copyright @ 2003 - 2020 Bleeping Computer® LLC - All Rights Reserved



LOGIN

Username
Password
Remember Me
Sign in anonymously
Sign in with Twitter

--------------------------------------------------------------------------------

Not a member yet? Register Now

REPORTER

HELP US UNDERSTAND THE PROBLEM. WHAT IS GOING ON WITH THIS COMMENT?

 * Spam
 * Abusive or Harmful
 * Inappropriate content
 * Strong language
 * Other
 * 

Learn more about what is not allowed to be posted.

Submitting...
SUBMIT