Skip to main content

ECCENTRICBANDWAGON, VIVACIOUSGIFT, and FASTCASH Trojans

Three new HIDDEN COBRA tools; ECCENTRICBANDWAGON, VIVACIOUSGIFT, and FASTCASH for Windows, have been observed in attacks in Western Europe and North America. These tools appear to be used for variety of purposed including extracting financial information and acting as proxy servers.

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Three new HIDDEN COBRA tools; ECCENTRICBANDWAGON, VIVACIOUSGIFT, and FASTCASH for Windows, have been observed in attacks in Western Europe and North America. These tools appear to be used for variety of purposed including extracting financial information and acting as proxy servers.


Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Details of three new remote access trojans created by the HIDDEN COBRA advanced persistent threat group have been released. ECCENTRICBANDWAGON, VIVACIOUSGIFT, and FASTCASH for Windows are believed to be used in highly targeted attacks against financial, engineering, government, and non-governmental organisations.


Delivery

At the time of publication, it is unclear how exactly how any of the three trojans are delivered, although there are unconfirmed reports indicating they may be distributed via spear phishing emails or as secondary payloads of other HIDDEN COBRA tools.


ECCENTRICBANDWAGON

All ECCENTRICBANDWAGON variants consist of a primary DLL file that, when executed, uses three separate files to screen shots, systems logs, and key logs. Some variants will encrypt these files using RC4, whilst others include basic clean-up functionality that will attempt to remove these log files once ECCENTRICBANDWAGON has finished before terminating all explorer.exe processes


VIVACIOUSGIFT

VIVACIOUSGIFT is used as a network proxy tool and consists of a single 32-bit EXE file containing a set of hard-coded strings. When executed, it will decode these strings to obtain source and proxy IP/Port combinations, before connecting to command and control server to receive a set of initialisation strings. If successful, it then connects to destination IP address starts its proxy functionality. 


FASTCASH for Windows

FASTCASH appears to be used primarily against financial organisations and banking payment systems. It consists of two executable files, the first of which is used to identify and intercept specific requests containing Primary Account Numbers or ISO 8583 messages. The second file is injected into a running processes and is used to man-in-the-middle attacks using the previously intercepted requests.


Remediation advice

To prevent and detect an infection, NHS Digital advises that:

  • Secure configurations are applied to all devices.
  • Security updates are applied at the earliest opportunity.
  • Tamper protection settings in security products are enabled where available.
  • Obsolete platforms are segregated from the rest of the network.
  • IT usage policies are reinforced by regular training to ensure all users know not to open unsolicited links or attachments.
  • Multi-factor authentication (MFA) and lockout policies are used where practicable, especially for administrative accounts.
  • Administrative accounts are only used for necessary purposes.
  • Remote administration services use strongly encrypted protocols and only accept connections from authorised users or locations.
  • Systems are continuously monitored, and unusual activity is investigated, so that a compromise of the network can be detected as early as possible.

Please note that the NCSC maintains guidance for securely configuring a wide range of end user device (EUD) platforms. For further details refer to their end user device security guidance pages.


Indicators of compromise

Host indicators

ECCENTRICBANDWAGON SHA256 hashes

  • 32a4de070ca005d35a88503717157b0dc3f2e8da76ffd618fca6563aec9c81f8
  • 9ea5aa00e0a738b74066c61b1d35331170a9e0a84df1cc6cef58fd46a8ec5a2e
  • c6930e298bba86c01d0fe2c8262c46b4fce97c6c5037a193904cfc634246fbec
  • efd470cfa90b918e5d558e5c8c3821343af06eedfd484dfeb20c4605f9bdc30e

VIVACIOUSGIFT SHA256 hashes

  • 70b494b0a8fdf054926829dcb3235fc7bd0346b6a19faf2a57891c71043b3b38
  • 8cad61422d032119219f465331308c5a61e21c9a3a431b88e1f8b25129b7e2a1
  • 9a776b895e93926e2a758c09e341accb9333edc1243d216a5e53f47c6043c852
  • a917c1cc198cf36c0f2f6c24652e5c2e94e28d963b128d54f00144d216b2d118
  • aca598e2c619424077ef8043cb4284729045d296ce95414c83ed70985c892c83
  • f3ca8f15ca582dd486bd78fd57c2f4d7b958163542561606bebd250c827022de

FASTCASH SHA256 hashes

  • 129b8825eaf61dcc2321aad7b84632233fa4bbc7e24bdf123b507157353930f0
  • 39cbad3b2aac6298537a85f0463453d54ab2660c913f4f35ba98fffeb0b15655
  • 5cb7a352535b447609849e20aec18c84d8b58e377d9c6365eafb45cdb7ef949b

Last edited: 3 September 2020 10:52 am