{"id":85095,"date":"2018-03-08T06:00:32","date_gmt":"2018-03-08T14:00:32","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=85095"},"modified":"2025-06-02T00:54:30","modified_gmt":"2025-06-02T07:54:30","slug":"hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/","title":{"rendered":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant"},"content":{"rendered":"<p><em>This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.<\/em><strong>\u00a0<\/strong><\/p>\n<p>On February 28, the McAfee Advanced Threat Research team discovered that the cybercrime group Hidden Cobra continues to target cryptocurrency and financial organizations. In this analysis, we observed the return of Hidden Cobra\u2019s Bankshot malware implant surfacing in the Turkish financial system. Based on the code similarity, the victim\u2019s business sector, and the presence of control server strings, this attack resembles <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/attacks-swift-banking-system-benefit-insider-knowledge\/\" target=\"_blank\" rel=\"noopener\">previous attacks<\/a> by Hidden Cobra conducted against the global financial network <a href=\"https:\/\/www.swift.com\/\" target=\"_blank\" rel=\"noopener\">SWIFT.<\/a><\/p>\n<p>In this new, aggressive campaign we see a return of the Bankshot implant, which last appeared in 2017. Bankshot is designed to persist on a victim\u2019s network for further exploitation; thus the Advanced Threat Research team believes this operation is intended to gain access to specific financial organizations.<\/p>\n<p>Based on our analysis, financial organizations in Turkey were targeted via spear phishing emails containing a malicious Microsoft Word document. The document contains an embedded Adobe Flash exploit, which was recently announced by the Korean Internet Security agency. The exploit, which takes advantage of <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/hackers-bypassed-adobe-flash-protection-mechanism\/\" target=\"_blank\" rel=\"noopener\">CVE-2018-4878,<\/a> allows an attacker to execute arbitrary code such as an implant.<\/p>\n<p>the Further investigation into this campaign and analysis of McAfee product telemetry shows that the infection occurred on March 2 and 3. The implant\u2019s first target was a major government-controlled financial organization. It next appeared in another Turkish government organization involved in finance and trade. A further three large financial institutions in Turkey were victims of this attack. The implant has so far not surfaced in any other sector or country. This campaign suggests the attackers may plan a future heist against these targets by using Bankshot to gather information.<\/p>\n<p>Bankshot implants are distributed from a domain with a name similar to that of the cryptocurrency-lending platform Falcon Coin, but the similarly named domain is not associated with the legitimate entity. The malicious domain falcancoin.io was created December 27, 2017, and was updated on February 19, only a few days before the implants began to appear. These implants are variations of earlier forms of Bankshot, a remote access tool that gives an attacker full capability on a victim\u2019s system. This implant also contains functionality to wipe files and content from the targeted system to erase evidence or perform other destructive actions. Bankshot was first reported by the <a href=\"https:\/\/www.us-cert.gov\/sites\/default\/files\/publications\/MAR-10135536-B_WHITE.PDF\" target=\"_blank\" rel=\"noopener\">Department of Homeland Security<\/a> on December 13, 2017, and has only recently resurfaced in newly compiled variants. The sample we analyzed is 99% similar to the documented Bankshot variants from 2017.<\/p>\n<figure id=\"attachment_85112\" aria-describedby=\"caption-attachment-85112\" style=\"width: 483px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85112 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\" alt=\"\" width=\"483\" height=\"260\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png 483w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1-300x161.png 300w\" sizes=\"auto, (max-width: 483px) 100vw, 483px\" \/><\/a><figcaption id=\"caption-attachment-85112\" class=\"wp-caption-text\"><em>Bankshot implants hosted on falcancoin.io.<\/em><\/figcaption><\/figure>\n<p>The Bankshot implant is attached to a malicious Word document with the filename Agreement.docx. The document appears to be an agreement template for Bitcoin distribution between an unknown individual in Paris and a to-be-determined cryptocurrency exchange. The author of this document is test-pc. It was created February 26 and was submitted from the Netherlands. The document contains an embedded Flash script that exploits CVE-2018-4878 and downloads and executes the DLL implant from falcancoin.io.<\/p>\n<p>We discovered two more documents, written in Korean, that exploit the same vulnerability as Agreement.docx. These documents appear to be part of the same campaign and may have been used on different targets. These documents also communicated with falcancoin.io to install Bankshot and also contain themes around cryptocurrency security.<\/p>\n<h2>Two Flash files exploit CVE-2018-4878.<\/h2>\n<ul>\n<li>843c17b06a3aee22447f021307909890b68828b9 (February 25)<\/li>\n<li>343ebca579bb888eb8ccb811f9b52280c72e484c (February 25<\/li>\n<\/ul>\n<figure id=\"attachment_85141\" aria-describedby=\"caption-attachment-85141\" style=\"width: 1034px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85141 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1.png\" alt=\"\" width=\"1034\" height=\"222\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1.png 1034w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1-300x64.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1-768x165.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-2-1-1024x220.png 1024w\" sizes=\"auto, (max-width: 1034px) 100vw, 1034px\" \/><\/a><figcaption id=\"caption-attachment-85141\" class=\"wp-caption-text\">Malicious documents in the attack.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85114\" aria-describedby=\"caption-attachment-85114\" style=\"width: 790px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85114 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3.png\" alt=\"\" width=\"790\" height=\"811\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3.png 790w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3-292x300.png 292w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3-768x788.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3-487x500.png 487w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-3-50x50.png 50w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><\/a><figcaption id=\"caption-attachment-85114\" class=\"wp-caption-text\">Malicious document exploiting CVE-2018-4878.<\/figcaption><\/figure>\n<p>The implants are downloaded via a Flash file embedded in the malicious document. They are executed when the victim views the document.<\/p>\n<figure id=\"attachment_85115\" aria-describedby=\"caption-attachment-85115\" style=\"width: 802px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85115 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-4.png\" alt=\"\" width=\"802\" height=\"371\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-4.png 802w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-4-300x139.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-4-768x355.png 768w\" sizes=\"auto, (max-width: 802px) 100vw, 802px\" \/><\/a><figcaption id=\"caption-attachment-85115\" class=\"wp-caption-text\"><em>The malicious site falcancoin.io embedded in the Flash file.<\/em><\/figcaption><\/figure>\n<figure id=\"attachment_85116\" aria-describedby=\"caption-attachment-85116\" style=\"width: 792px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85116 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-5.png\" alt=\"\" width=\"792\" height=\"422\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-5.png 792w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-5-300x160.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-5-768x409.png 768w\" sizes=\"auto, (max-width: 792px) 100vw, 792px\" \/><\/a><figcaption id=\"caption-attachment-85116\" class=\"wp-caption-text\"><em>Implant directory contained in the malicious Flash file.<\/em><\/figcaption><\/figure>\n<p>The implants (DLLs) are disguised as ZIP files and communicate with three control servers, two of them Chinese-language online gambling sites. These URLs can be found hardcoded in the implants\u2019 code.<\/p>\n<figure id=\"attachment_85117\" aria-describedby=\"caption-attachment-85117\" style=\"width: 596px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85117 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6.png\" alt=\"\" width=\"596\" height=\"618\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6.png 596w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6-289x300.png 289w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6-482x500.png 482w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-6-32x32.png 32w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><figcaption id=\"caption-attachment-85117\" class=\"wp-caption-text\"><em>Hardcoded control server URLs.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2><strong>Analyzing Bankshot<\/strong><\/h2>\n<p>The sample (a2e966edee45b30bb6bb5c978e55833eec169098) is a Windows DLL that serves as a backdoor and contains a variety of capabilities. The malicious DLL is not a service DLL because it lacks ServiceMain(). To mask itself, it can run as a regular library loaded into a legitimate process.<\/p>\n<p>The malware begins by creating a new thread from the DllMain() function to carry out its malicious activities:<\/p>\n<figure id=\"attachment_85118\" aria-describedby=\"caption-attachment-85118\" style=\"width: 625px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85118 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-7.png\" alt=\"\" width=\"625\" height=\"104\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-7.png 625w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-7-300x50.png 300w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/a><figcaption id=\"caption-attachment-85118\" class=\"wp-caption-text\"><em>New thread created in the malware\u2019s DllMain() function.<\/em><\/figcaption><\/figure>\n<p>The malware performs the following activities:<\/p>\n<ul>\n<li>Builds imports by dynamically loading APIs<\/li>\n<li>Decrypts strings needed for control server communications<\/li>\n<li>Performs control server communications<\/li>\n<li>Handles commands issued by the control server<\/li>\n<li>Uninstalls self from the system<\/li>\n<\/ul>\n<p>The malicious thread dynamically loads the APIs it needs at the beginning of its execution using LoadLibrary() and GetProcAddress(). APIs <b>from<\/b> the following libraries are loaded at runtime:<\/p>\n<ul>\n<li>Kernel32.dll<\/li>\n<li>Ws2_32\/wsock32.dll<\/li>\n<li>Apvapi32.dll<\/li>\n<li>Oleaut32.dll<\/li>\n<li>Iphlp.dll<\/li>\n<li>Urlmon.dll<\/li>\n<\/ul>\n<figure id=\"attachment_85119\" aria-describedby=\"caption-attachment-85119\" style=\"width: 450px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85119 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-8.png\" alt=\"\" width=\"450\" height=\"99\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-8.png 450w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-8-300x66.png 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><figcaption id=\"caption-attachment-85119\" class=\"wp-caption-text\"><em>A dynamic API loaded by the malware.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>Based on packet capture analysis of previous implants from 2017, the following strings are used in control server communications:<\/p>\n<ul>\n<li><em>Connection: keep-alive<\/em><\/li>\n<li><em>Cache-Control: max-age=0<\/em><\/li>\n<li><em>Accept: *\/*<\/em><\/li>\n<li><em>Content-Type: multipart\/form-data; boundary=<\/em><\/li>\n<li><em>Content-Type: application\/octet-stream<\/em><\/li>\n<li><em>Accept-Encoding: gzip,deflate,sdch<\/em><\/li>\n<li><em>Accept-Language: ko-KR -&gt; Korean <\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;board_id&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;user_id&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;img01_29.jpg&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;my.doc&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;pratice.pdf&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;king.jpg&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;dream.avi&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;hp01.avi&#8221;<\/em><\/li>\n<li><em>Content-Disposition: form-data;name=&#8221;file1&#8243;; filename=&#8221;star.avi&#8221;<\/em><\/li>\n<\/ul>\n<h3><strong>User Agents<\/strong><\/h3>\n<p>The implant either fetches the user agent from Internet Explorer (using ObtainUserAgentAsString()) or uses a default user agent specified in the malware binary:<\/p>\n<p style=\"padding-left: 30px;\">Mozilla\/5.0 (Windows NT 6.1; WOW64) Chrome\/28.0.1500.95 Safari\/537.36<\/p>\n<h2><strong>Control Server Communications<\/strong><\/h2>\n<p>The malware initiates communication with the control server by sending it an HTTP POST request with additional optional HTTP data, such as:<\/p>\n<pre>------FormBoundary&lt;randomly_generated_characters&gt;\r\nContent-Disposition: form-data; name=\"board_id\"\r\n\r\n<strong>8306<\/strong>\r\n------FormBoundary&lt;randomly_generated_characters&gt;\r\nContent-Disposition: form-data; name=\"user_id\"\r\n\r\n<strong>*dJU!*JE&amp;!M@UNQ@<\/strong>\r\n------FormBoundary&lt;randomly_generated_characters&gt;\r\nContent-Disposition: form-data; name=\"file1\"; filename=\"king.jpg\"\r\nContent-Type: application\/octet-stream<\/pre>\n<ul>\n<li><span style=\"text-decoration: underline;\"><strong>board_id <\/strong><\/span>is a four-digit number that may be an identifier for a campaign ID. Based on analysis of previous samples, this is a unique identifier.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>user_id<\/strong><\/span> is a hardcoded value in the malware binary that is sent to the control server. The username appears to be attacker specified and has occurred in 2017 Bankshot samples. This links the previous samples with this unique username.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong>filename <\/strong><\/span>is based on static analysis. This looks like a specific beacon to indicate that the malware is ready to receive commands.<\/li>\n<\/ul>\n<p>The optional HTTP data with king.jpg looks like a beacon to inform the control server that the malware is ready to accept new commands:<\/p>\n<ul>\n<li>Commands received from the control server are encoded DWORDs<\/li>\n<li>After decoding, these DWORDs should be in the range 123459h to 123490h<\/li>\n<\/ul>\n<figure id=\"attachment_85120\" aria-describedby=\"caption-attachment-85120\" style=\"width: 704px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85120 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-9.png\" alt=\"\" width=\"704\" height=\"137\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-9.png 704w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-9-300x58.png 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/a><figcaption id=\"caption-attachment-85120\" class=\"wp-caption-text\"><em>Malware checking to make sure a received command is in the correct range.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85121\" aria-describedby=\"caption-attachment-85121\" style=\"width: 605px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85121 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-10.png\" alt=\"\" width=\"605\" height=\"143\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-10.png 605w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-10-300x71.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/a><figcaption id=\"caption-attachment-85121\" class=\"wp-caption-text\"><em>The command index calculator and jump to the appropriate command.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85122\" aria-describedby=\"caption-attachment-85122\" style=\"width: 813px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85122 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11.png\" alt=\"\" width=\"813\" height=\"645\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11.png 813w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11-300x238.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11-768x609.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-11-630x500.png 630w\" sizes=\"auto, (max-width: 813px) 100vw, 813px\" \/><\/a><figcaption id=\"caption-attachment-85122\" class=\"wp-caption-text\"><em>The command index table and command handler address table.\u00a0<\/em><\/figcaption><\/figure>\n<h2><strong>Implant Capabilities<\/strong><\/h2>\n<p>Based on the responses received from the control server, the malware can carry out the following malicious tasks:<\/p>\n<ul>\n<li>Recursively generate a list of files in a directory and send to the control server<\/li>\n<li>Terminate a specific process. The process is identified by the control server sending the PID to the malware.<\/li>\n<\/ul>\n<figure id=\"attachment_85123\" aria-describedby=\"caption-attachment-85123\" style=\"width: 559px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85123 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-12.png\" alt=\"\" width=\"559\" height=\"182\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-12.png 559w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-12-300x98.png 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\" \/><\/a><figcaption id=\"caption-attachment-85123\" class=\"wp-caption-text\"><em>The capability to terminate a process.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Gather network addresses and operating system version<\/li>\n<li>Execute arbitrary commands using \u201ccmd.exe \/c\u201d<\/li>\n<\/ul>\n<figure id=\"attachment_85124\" aria-describedby=\"caption-attachment-85124\" style=\"width: 363px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85124 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13.png\" alt=\"\" width=\"363\" height=\"365\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13.png 363w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-150x150.png 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-298x300.png 298w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-50x50.png 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-64x64.png 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-96x96.png 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-13-128x128.png 128w\" sizes=\"auto, (max-width: 363px) 100vw, 363px\" \/><\/a><figcaption id=\"caption-attachment-85124\" class=\"wp-caption-text\"><em>The capability to execute system commands.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85125\" aria-describedby=\"caption-attachment-85125\" style=\"width: 471px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85125 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-14.png\" alt=\"\" width=\"471\" height=\"211\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-14.png 471w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-14-300x134.png 300w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/a><figcaption id=\"caption-attachment-85125\" class=\"wp-caption-text\"><em>Spawning arbitrary processes.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Create processes<\/li>\n<li>Write responses from the control server to a file<\/li>\n<li>Send information for all drives<\/li>\n<li>Write data sent by the control server to a temporary file matching the file path pattern %temp%\\DWS00*<\/li>\n<li>Change the time of a file as specified by the control server<\/li>\n<\/ul>\n<figure id=\"attachment_85126\" aria-describedby=\"caption-attachment-85126\" style=\"width: 507px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85126 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-15.png\" alt=\"\" width=\"507\" height=\"393\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-15.png 507w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-15-300x233.png 300w\" sizes=\"auto, (max-width: 507px) 100vw, 507px\" \/><\/a><figcaption id=\"caption-attachment-85126\" class=\"wp-caption-text\"><em>The malware changing the file time.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Create a process by impersonating a logged-on user<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85127\" aria-describedby=\"caption-attachment-85127\" style=\"width: 572px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85127 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-16.png\" alt=\"\" width=\"572\" height=\"119\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-16.png 572w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-16-300x62.png 300w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/a><figcaption id=\"caption-attachment-85127\" class=\"wp-caption-text\"><em>Getting a user token using WTSQueryUserToken.<\/em><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85128\" aria-describedby=\"caption-attachment-85128\" style=\"width: 516px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-17.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85128 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-17.png\" alt=\"\" width=\"516\" height=\"246\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-17.png 516w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-17-300x143.png 300w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><\/a><figcaption id=\"caption-attachment-85128\" class=\"wp-caption-text\"><em>A process created as <\/em>logged-in<em> user.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Gather the process time for all processes<\/li>\n<\/ul>\n<figure id=\"attachment_85129\" aria-describedby=\"caption-attachment-85129\" style=\"width: 651px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-18.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85129 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-18.png\" alt=\"\" width=\"651\" height=\"275\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-18.png 651w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-18-300x127.png 300w\" sizes=\"auto, (max-width: 651px) 100vw, 651px\" \/><\/a><figcaption id=\"caption-attachment-85129\" class=\"wp-caption-text\"><em>Getting time information for all processes running on the system.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Gather domain and account names based on all running processes<\/li>\n<\/ul>\n<figure id=\"attachment_85130\" aria-describedby=\"caption-attachment-85130\" style=\"width: 472px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85130 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19.png\" alt=\"\" width=\"472\" height=\"483\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19.png 472w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19-293x300.png 293w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19-50x50.png 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-19-64x64.png 64w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><\/a><figcaption id=\"caption-attachment-85130\" class=\"wp-caption-text\"><em>Gathering account information from running processes.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Read a specified file\u2019s contents and send the data to the control server<\/li>\n<li>Write data sent by the control server to an existing file<\/li>\n<li>Mark a file to be deleted on reboot<\/li>\n<\/ul>\n<figure id=\"attachment_85131\" aria-describedby=\"caption-attachment-85131\" style=\"width: 450px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85131 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-20.png\" alt=\"\" width=\"450\" height=\"80\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-20.png 450w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-20-300x53.png 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><figcaption id=\"caption-attachment-85131\" class=\"wp-caption-text\"><em>Marking a file for deletion on reboot.<\/em><\/figcaption><\/figure>\n<ul>\n<li>Overwrite a file with all zeros and mark it for deletion on reboot<\/li>\n<\/ul>\n<figure id=\"attachment_85132\" aria-describedby=\"caption-attachment-85132\" style=\"width: 708px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-21.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85132 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-21.png\" alt=\"\" width=\"708\" height=\"830\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-21.png 708w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-21-256x300.png 256w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-21-427x500.png 427w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/a><figcaption id=\"caption-attachment-85132\" class=\"wp-caption-text\"><em>Wiping files with zeros and marking it for deletion on reboot.\u00a0<\/em><\/figcaption><\/figure>\n<ul>\n<li>Delete files using the DeleteFile() API<\/li>\n<li>Load an arbitrary library into its process space. This may be used to load additional downloaded components of the attack.<\/li>\n<\/ul>\n<figure id=\"attachment_85133\" aria-describedby=\"caption-attachment-85133\" style=\"width: 512px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-22.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85133 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-22.png\" alt=\"\" width=\"512\" height=\"49\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-22.png 512w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-22-300x29.png 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><figcaption id=\"caption-attachment-85133\" class=\"wp-caption-text\"><em>Loading an arbitrary library into its own process space.\u00a0<\/em><\/figcaption><\/figure>\n<p>After every action is performed the malware sends a response to the control server indicating whether the action was successful.<\/p>\n<h2><strong>Connections <\/strong><\/h2>\n<p>The <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-318A\" target=\"_blank\" rel=\"noopener\">US government reports<\/a> that Bankshot is used by Hidden Cobra to target multiple industries including financial organizations. This implant has been connected to a major Korean <a href=\"https:\/\/www.blackhat.com\/docs\/eu-17\/materials\/eu-17-Shen-Nation-State%20Moneymules-Hunting-Season-APT-Attacks-Targeting-Financial-Institutions.pdf\" target=\"_blank\" rel=\"noopener\">bank attack<\/a> and is also known as Trojan Manuscript. That variant contained the capability to search for hosts related to the SWIFT network and the same control server strings as the variant we found targeting the Turkish financial sector. The implant does not conduct financial transactions; rather it is a channel into the victim\u2019s environment, in which further stages of implants can be deployed for financial reconnaissance. The Bankshot implant was also observed in 2017 in documents appearing to come from Latin American banks.<\/p>\n<figure id=\"attachment_85134\" aria-describedby=\"caption-attachment-85134\" style=\"width: 1143px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85134 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23.png\" alt=\"\" width=\"1143\" height=\"475\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23.png 1143w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23-300x125.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23-768x319.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-23-1024x426.png 1024w\" sizes=\"auto, (max-width: 1143px) 100vw, 1143px\" \/><\/a><figcaption id=\"caption-attachment-85134\" class=\"wp-caption-text\"><em>Malicious document delivering the Bankshot implant in 2017.<\/em><\/figcaption><\/figure>\n<p>These connections, combined with the implant\u2019s nearly identical appearance to known variants, are a strong indication that we have uncovered a Hidden Cobra attack. Further, previous implants from 2017 contained bogus documents with financially themed content.<\/p>\n<figure id=\"attachment_85135\" aria-describedby=\"caption-attachment-85135\" style=\"width: 2324px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85135 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24.png\" alt=\"\" width=\"2324\" height=\"1794\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24.png 2324w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24-300x232.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24-768x593.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24-1024x790.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-24-648x500.png 648w\" sizes=\"auto, (max-width: 2324px) 100vw, 2324px\" \/><\/a><figcaption id=\"caption-attachment-85135\" class=\"wp-caption-text\"><em>A code comparison of hash 12c786c490366727cf7279fc141921d8 with hash 6de6a0df263ecd2d71a92597b2362f2c (from November 28, 2017).\u00a0<\/em><\/figcaption><\/figure>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>We have found what may be an early data-gathering stage for future possible heists from financial organizations in Turkey (and possibly other countries). In this campaign, we see the adoption of a recent zero-day Adobe Flash vulnerability to get the implant onto the victim\u2019s systems.<\/p>\n<p>The campaign has a high chance of success against victims who have an unpatched version of Flash. Documents with the Flash exploit managed to evade static defenses and remain undetected as an exploit on VirusTotal. This is the first time that Bankshot has been tied directly to financial-related hacking and the first time it has been used since November 2017.<\/p>\n<p>McAfee detects these threats as:<\/p>\n<ul>\n<li>RDN\/Generic Exploit<\/li>\n<li>RDN\/Generic.dx<\/li>\n<li>Generic PWS.y<\/li>\n<li><strong>Generic.<\/strong>hbg<\/li>\n<li>Exploit-CVE2018-4878<\/li>\n<\/ul>\n<p>McAfee customers are also covered by McAfee Global Threat Intelligence Web Reputation classification, which rate these URLs as High Risk.<\/p>\n<h2><strong>Indicators of Compromise<\/strong><\/h2>\n<h4><em>MITRE ATT&amp;CK techniques<\/em><\/h4>\n<ul>\n<li>Exfiltration over command and control channel<\/li>\n<li>Commonly used port<\/li>\n<li>Command-line interface<\/li>\n<li>Service execution<\/li>\n<li>Automated collection<\/li>\n<li>Data from local system<\/li>\n<li>Process discovery<\/li>\n<li>System time discovery<\/li>\n<li>Credential dumping<\/li>\n<li>Exploitation of vulnerability<\/li>\n<li>Process injection<\/li>\n<li>File deletion<\/li>\n<\/ul>\n<h4><em>Hashes<\/em><\/h4>\n<ul>\n<li>650b7d25f4ed87490f8467eb48e0443fb244a8c4<\/li>\n<li>65e7d2338735ec04fd9692d020298e5a7953fd8d<\/li>\n<li>166e8c643a4db0df6ffd6e3ab536b3de9edc9fb7<\/li>\n<li>a2e966edee45b30bb6bb5c978e55833eec169098<\/li>\n<\/ul>\n<h4><em>Domains<\/em><\/h4>\n<ul>\n<li>530hr[dot]com\/data\/common.php<\/li>\n<li>028xmz[dot]com\/include\/common.php<\/li>\n<li>168wangpi[dot]com\/include\/charset.php<\/li>\n<li>Falcancoin[dot]io<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced&#8230;<\/p>\n","protected":false},"author":911,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1411,5526,76,4452,180],"coauthors":[2544],"class_list":["post-85095","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-persistent-threats","tag-advanced-threat-research","tag-cybercrime","tag-cybersecurity","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-08T14:00:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T07:54:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"483\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ryan Sherstobitoff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@r_sherstobitoff\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ryan Sherstobitoff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\"},\"author\":{\"name\":\"Ryan Sherstobitoff\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\"},\"headline\":\"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant\",\"datePublished\":\"2018-03-08T14:00:32+00:00\",\"dateModified\":\"2025-06-02T07:54:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\"},\"wordCount\":2059,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\",\"keywords\":[\"advanced persistent threats\",\"Advanced Threat Research\",\"cybercrime\",\"cybersecurity\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\",\"name\":\"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\",\"datePublished\":\"2018-03-08T14:00:32+00:00\",\"dateModified\":\"2025-06-02T07:54:30+00:00\",\"description\":\"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035\",\"name\":\"Ryan Sherstobitoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg\",\"caption\":\"Ryan Sherstobitoff\"},\"description\":\"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/\",\"https:\/\/x.com\/r_sherstobitoff\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog","description":"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog","og_description":"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-03-08T14:00:32+00:00","article_modified_time":"2025-06-02T07:54:30+00:00","og_image":[{"width":483,"height":260,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png","type":"image\/png"}],"author":"Ryan Sherstobitoff","twitter_card":"summary_large_image","twitter_creator":"@r_sherstobitoff","twitter_site":"@McAfee","twitter_misc":{"Written by":"Ryan Sherstobitoff","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/"},"author":{"name":"Ryan Sherstobitoff","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035"},"headline":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant","datePublished":"2018-03-08T14:00:32+00:00","dateModified":"2025-06-02T07:54:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/"},"wordCount":2059,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png","keywords":["advanced persistent threats","Advanced Threat Research","cybercrime","cybersecurity","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/","name":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png","datePublished":"2018-03-08T14:00:32+00:00","dateModified":"2025-06-02T07:54:30+00:00","description":"This post was prepared with contributions from Asheer Malhotra, Charles Crawford, and Jessica Saavedra-Morales.\u00a0 On February 28, the McAfee Advanced","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/03\/20180307-Hidden-Cobra-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Hidden Cobra Targets Turkish Financial Sector With New Bankshot Implant"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f80835dde8294e9c91e4cd0f998e035","name":"Ryan Sherstobitoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/b9bc99b6021883cbf5794b450795dc55","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/07\/Ryan-150x150.jpg","caption":"Ryan Sherstobitoff"},"description":"Ryan Sherstobitoff is a Senior Analyst for Major Campaigns \u2013 Advanced Threat Research in McAfee. Ryan specializes in threat intelligence in the Asia Pacific Region where he conducts cutting edge research into new adversarial techniques and adapts those to better monitor the threat landscape. He formerly was the Chief Corporate Evangelist at Panda Security, where he managed the US strategic response for new and emerging threats. Ryan is widely recognized as a security &amp; cloud computing expert throughout the country.","sameAs":["https:\/\/www.linkedin.com\/in\/ryan-sherstobitoff-a1334a5\/","https:\/\/x.com\/r_sherstobitoff"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/ryan-sherstobitoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/911"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=85095"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85095\/revisions"}],"predecessor-version":[{"id":214796,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/85095\/revisions\/214796"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=85095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=85095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=85095"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=85095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}