New ‘Beep’ malware uses evasion techniques to steal sensitive data

Minerva analysts have discovered a new malware called ‘Beep,’ which is still in development and employs several features to avoid detection and analysis by security software. Beep malware is a data stealer that is designed to collect sensitive data from victims’ computers.

The malware is composed of three parts: a dropper, an injector, and the payload. The dropper and injector are designed to work together to download the payload, which is then used to steal information.

To avoid detection by security software, Beep employs a variety of evasion techniques, including anti-debugging, anti-VM, and anti-sandboxing techniques. It is also intended to avoid dynamic analysis, a technique used by security analysts to examine malware samples.

The malware is activated by C2 commands that perform specific functions such as capturing screenshots, logging keystrokes, and stealing sensitive information. Minerva analysts were able to identify these functions and determine how the C2 commands triggered them.

The Minerva sample is still in development, but as it is refined, it is expected to become more sophisticated. The fact that it has already been uploaded to VirusTotal suggests that some threat actors are already using it.

The sources for this piece include an article in BleepingComputer.

IT World Canada Staff
IT World Canada Staff
The online resource for Canadian Information Technology professionals.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Best of The Web