Strava Technologies (P) LTD
The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection. Unlike other banking Trojan that leverages on injection mechanisms, Retefe routes online banking traffic intended for targeted banks through a proxy.
Retefe remained quite dormant for more than a year (except for a few attacks in 2018), the last major campaign was observed in 2017, when threat actors added the NSA exploit EternalBlue exploit code to the malware to improve its spreading capabilities.
Threat actors included in the new variant an application called Stunnel, into the proceedings. Stunnel is a proxy designed to add TLS encryption functionality to existing clients and servers without any changes in the programs’ code.
“Retefe extracts stunnel via a compressed archive in place of the usual TOR Socat proxy. In addition to the use of the decoy abused shareware, this is the most significant observed change to Retefe’s behavior, along with the use of Smoke Loader.” reads the analysis published by Proofpoint. “We suspect that the use of a dedicated tunnel rather than Tor makes for a more secure connection because it eliminates the possibility of snooping on the hops between Tor nodes.”
Secure Tunneling (stunnel) replaces Tor because the latter is considered a noiser protocol that would be easier to detect in an enterprise environment than stunnel. The latest variant of the Retefe banking Trojan also included the abuse of a legitimate shareware application known as “Convert PDF to Word Plus 1.0”. The application is a Python script that has been packaged as an executable using PyInstaller and packed into an archive using the UPX packing engine. The malicious script uses a certificate issued by DigiCert.
In the spam campaigns observed by the experts, attackers trick users into installing the application in order to correctly view the attached document. When the victim launches the application, the Python script writes two files to the victim machine. One is a legitimate installer for the Convert PDF to Word Plus application and is executed as a decoy, while the other is a loader for the banking Trojan. The loader extracts the files using the 7-Zip file-compression utility and stunnel from its resources, then decrypts and executes the main Retefe JavaScript code.
Campaigns targeting macOS users leverage digitally signed versions of fake Adobe Installers used to deliver their malware, “By using signed binaries, actors attempt to bypass the macOS internal Gatekeeper security application, which checks if applications are signed by a valid developer certificate before running,”
"Retefe in particular is noted for changing its proxy configuration, having previously used Profixifier and in 2019 moving to stunnel. As with many types of malware, developers continue to innovate, identifying new, more effective ways to infect victims and steal personal information to better monetize their attacks."
© 2021 Strava Technologies (P) Ltd. All rights reserved