Can you explain how to decode the Zeus config.bin file?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The Zeus config.bin file is used to store the Zeus Trojan configuration. The file is encrypted with RC4, so it must be unecrypted, or decoded, before it can be analyzed. ThreatExpert has a blog post on how to decode the Zeus config file along with a utility for doing so. You can also use the free OllyDebug tool for Zeus Trojan analysis and decoding the config file. The file contains the details of which URLs are targeted by the customized Zeus bot. By identifying the URLs targeted, you can further observe what account credentials were attacked. The config file also has URLs used for downloading updates, which you can use to try to identify other infected computers on your network.
Ask the expert
Have questions about enterprise information security threats? Send them to expert Nick Lewis, and you may see the answers appear on SearchSecurity.com! All questions are anonymous.
Once you have identified the targeted URLs, notify the affected websites they are being targeted so they can monitor their systems for attacks. You can also block access to these targeted websites, or only allow access from systems that require access and are clean from malware. For any account credentials compromised, you should immediately contact the financial institution to change the credentials and put a hold on any financial transactions that may have been initiated. You could also block access to the URLs used for updates to prevent updates.
Dig Deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly ...continue reading
The Irongate malware has been discovered to have similar functionality to Stuxnet. Expert Nick Lewis explains how enterprises can protect their ICS ...continue reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.