Minerva analysts have discovered a new malware called ‘Beep,’ which is still in development and employs several features to avoid detection and analysis by security software. Beep malware is a data stealer that is designed to collect sensitive data from victims’ computers.
The malware is composed of three parts: a dropper, an injector, and the payload. The dropper and injector are designed to work together to download the payload, which is then used to steal information.
To avoid detection by security software, Beep employs a variety of evasion techniques, including anti-debugging, anti-VM, and anti-sandboxing techniques. It is also intended to avoid dynamic analysis, a technique used by security analysts to examine malware samples.
The malware is activated by C2 commands that perform specific functions such as capturing screenshots, logging keystrokes, and stealing sensitive information. Minerva analysts were able to identify these functions and determine how the C2 commands triggered them.
The Minerva sample is still in development, but as it is refined, it is expected to become more sophisticated. The fact that it has already been uploaded to VirusTotal suggests that some threat actors are already using it.
The sources for this piece include an article in BleepingComputer.