What’s the matter?
Researchers from FireEye have observed that the FIN7 threat group has added two new tools to its malware arsenal, namely BOOSTWRITE and RDFSNIFFER.
About BOOSTWRITE
BOOSTWRITE is an in-memory-only dropper that decrypts embedded payloads using an encryption key retrieved from a remote server at runtime. Researchers noted that one of the samples analyzed by them was signed by a valid Certificate Authority.
“To accomplish this task, the malware first generates a random file name to be used as a text log under the current user's %TEMP% directory; this filename starts with ~rdf and is followed by a set of random numbers. Next, the malware scans its own image to find the location of a 32-byte long multi-XOR key which is used to decode data inside its body,” researchers noted.
About RDFSNIFFER
RDFSNIFFER is a payload DLL loaded by BOOSTWRITE.
“While these incidents have also included FIN7’s typical and long-used toolsets, such as CARBANAK and BABYMETAL, the introduction of new tools and techniques provides further evidence FIN7 is continuing to evolve in response to security enhancements,” researchers concluded.
Publisher