Malware Installation Using CHM Files
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
CHM usually consist of HTML pages, indexing, and other navigation tools. Their main purpose is to provide help to a user, however cyber-criminals are using them to execute malicious code via PowerShell commands.
When the link is clicked, it will download a zip file, which contains the malicious CHM file. With this spam campaign, the attacker used a technique first seen in 2005, which involves modifying a genuine transmission control protocol (TCP) IPv4 help file into one that contains an object linking and embedding control extension (OCX), which launches a PowerShell command when triggered. When the command is run, it will launch a script to download the malicious files onto the user’s system. The files are placed in a created folder named paladium, under C:\ProgramData. A task is also scheduled to launch the malicious files every one and a half hours and download new versions of the Trojan.
Threat updates
| Date | Update |
|---|---|
| 4 Jan 2018 |
Malicious CHM files have been used to download the Bancos Banking Trojan. |
Remediation advice
To prevent and detect a Trojan infection, ensure that:Remediation steps
Last edited: 17 February 2020 11:34 am