Can you explain how to decode the Zeus config.bin file?
The Zeus config.bin file is used to store the Zeus Trojan configuration. The file is encrypted with RC4, so it must be unecrypted, or decoded, before it can be analyzed. ThreatExpert has a blog post on how to decode the Zeus config file along with a utility for doing so. You can also use the free OllyDebug tool for Zeus Trojan analysis and decoding the config file. The file contains the details of which URLs are targeted by the customized Zeus bot. By identifying the URLs targeted, you can further observe what account credentials were attacked. The config file also has URLs used for downloading updates, which you can use to try to identify other infected computers on your network.
Ask the expert
Have questions about enterprise information security threats? Send them to expert Nick Lewis, and you may see the answers appear on SearchSecurity.com! All questions are anonymous.
Once you have identified the targeted URLs, notify the affected websites they are being targeted so they can monitor their systems for attacks. You can also block access to these targeted websites, or only allow access from systems that require access and are clean from malware. For any account credentials compromised, you should immediately contact the financial institution to change the credentials and put a hold on any financial transactions that may have been initiated. You could also block access to the URLs used for updates to prevent updates.
Dig deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis, Enterprise Threats
Researchers reportedly succeeded in extracting decryption keys using sound-based attacks. Is this a threat enterprises should worry about?continue reading
The amount of malware using peer-to-peer communications has increased dramatically. Enterprise threats expert Nick Lewis explains how to detect P2P ...continue reading
Cloaked malware, like DGA.Changer, can reportedly evade sandbox detection. Nick Lewis explains how to handle the risk.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.