<s>
ZeuS	B-Application
Panda	I-Application
,	O
Panda	O
Banker	O
,	O
or	O
Panda	O
is	O
a	O
variant	O
of	O
the	O
original	O
Zeus	O
(	O
Trojan	O
horse	O
)	O
under	O
the	O
banking	O
Trojan	O
category	O
.	O
</s>
<s>
Its	O
discovery	O
was	O
in	O
2016	O
in	O
Brazil	O
around	O
the	O
time	O
of	O
the	O
Olympic	B-Application
Games	I-Application
.	O
</s>
<s>
The	O
majority	O
of	O
the	O
code	O
is	O
derived	O
from	O
the	O
original	O
Zeus	O
trojan	O
,	O
and	O
maintains	O
the	O
coding	O
to	O
carry	O
out	O
man-in-the-browser	B-Protocol
,	O
keystroke	O
logging	O
,	O
and	O
form	O
grabbing	O
attacks	O
.	O
</s>
<s>
ZeuS	B-Application
Panda	I-Application
launches	O
attack	O
campaigns	O
with	O
a	O
variety	O
of	O
exploit	O
kits	O
and	O
loaders	B-Operating_System
by	O
way	O
of	O
drive-by	O
downloads	B-Application
and	O
phishing	O
emails	O
,	O
and	O
also	O
hooking	O
internet	O
search	O
results	O
to	O
infected	O
pages	O
.	O
</s>
<s>
ZeuS	B-Application
Panda	I-Application
utilizes	O
the	O
capabilities	O
from	O
numerous	O
loaders	B-Operating_System
such	O
as	O
Emotet	O
,	O
Smoke	O
Loader	B-Operating_System
,	O
Godzilla	O
,	O
and	O
Hancitor	O
.	O
</s>
<s>
The	O
methods	O
of	O
the	O
loaders	B-Operating_System
vary	O
but	O
the	O
same	O
end	O
state	O
goal	O
of	O
installing	O
ZeuS	B-Application
Panda	I-Application
into	O
a	O
system	O
is	O
the	O
same	O
.	O
</s>
<s>
Many	O
of	O
the	O
loaders	B-Operating_System
were	O
originally	O
trojans	O
before	O
were	O
retooled	O
as	O
a	O
delivery	O
system	O
for	O
ZeuS	B-Application
Panda	I-Application
.	O
</s>
<s>
The	O
delivery	O
mechanisms	O
do	O
not	O
stop	O
necessarily	O
with	O
the	O
aforementioned	O
loaders	B-Operating_System
as	O
Exploit	O
kits	O
such	O
as	O
Angler	O
,	O
Nuclear	O
,	O
Neutrino	O
,	O
Sundown	O
are	O
also	O
utilized	O
.	O
</s>
<s>
Coders	O
of	O
the	O
ZeuS	B-Application
Panda	I-Application
banking	O
trojan	O
,	O
as	O
well	O
as	O
other	O
trojan	O
coders	O
,	O
lean	O
toward	O
employing	O
loaders	B-Operating_System
over	O
exploit	O
kits	O
due	O
to	O
the	O
higher	O
potential	O
yield	O
in	O
monetary	O
gain	O
.	O
</s>
<s>
The	O
loaders	B-Operating_System
also	O
add	O
the	O
persistent	O
capability	O
of	O
ZeuS	B-Application
Panda	I-Application
across	O
reboot	O
and	O
also	O
if	O
it	O
is	O
deleted	O
.	O
</s>
<s>
If	O
ZeuS	B-Application
Panda	I-Application
no	O
longer	O
detected	O
on	O
a	O
system	O
and	O
if	O
the	O
loader	B-Operating_System
is	O
still	O
present	O
,	O
it	O
will	O
re-download	O
the	O
nefarious	O
code	O
and	O
start	O
running	O
all	O
over	O
again	O
.	O
</s>
<s>
One	O
of	O
the	O
key	O
distinctions	O
of	O
ZeuS	B-Application
Panda	I-Application
over	O
other	O
banking	O
trojans	O
is	O
the	O
ability	O
to	O
target	O
systems	O
in	O
specific	O
regions	O
of	O
the	O
world	O
.	O
</s>
<s>
It	O
does	O
this	O
by	O
a	O
rudimentary	O
process	O
by	O
which	O
it	O
detects	O
the	O
Human	B-General_Concept
Interface	I-General_Concept
Device	I-General_Concept
code	O
the	O
attached	O
keyboard	O
.	O
</s>
<s>
If	O
a	O
keyboard	O
code	O
from	O
Russia	O
(	O
0x419	O
)	O
,	O
Belarus	O
(	O
0x423	O
)	O
,	O
Kazakhstan	O
(	O
0x43f	O
)	O
or	O
Ukraine	O
(	O
0x422	O
)	O
is	O
detected	O
Zeus	B-Application
Panda	I-Application
will	O
self	O
delete	O
.	O
</s>
<s>
ZeuS	B-Application
Panda	I-Application
employs	O
many	O
methods	O
of	O
infection	O
,	O
namely	O
drive	O
by	O
downloads	B-Application
,	O
poisoned	O
email	O
,	O
word	O
document	O
macro	O
.	O
</s>
<s>
The	O
drive	O
by	O
downloads	B-Application
are	O
“	O
Downloads	B-Application
which	O
a	O
person	O
has	O
authorized	O
but	O
without	O
understanding	O
the	O
consequences	O
(	O
e.g.	O
</s>
<s>
downloads	B-Application
which	O
install	O
an	O
unknown	O
or	O
counterfeit	O
executable	B-Application
program	I-Application
,	O
ActiveX	B-Application
component	I-Application
,	O
or	O
Java	B-Language
applet	O
)	O
automatically.	O
”	O
Including	O
“	O
Any	O
download	B-Application
that	O
happens	O
without	O
a	O
person	O
's	O
knowledge	O
,	O
often	O
a	O
computer	O
virus	O
,	O
spyware	O
,	O
malware	O
,	O
or	O
crimeware.	O
”	O
Poisoned	O
email	O
occurs	O
when	O
a	O
mailing	O
list	O
is	O
injected	O
with	O
a	O
number	O
of	O
invalid	O
e-mail	O
addresses	O
,	O
the	O
resources	O
required	O
to	O
send	O
a	O
message	O
to	O
this	O
list	O
has	O
increased	O
,	O
even	O
though	O
the	O
number	O
of	O
valid	O
recipients	O
has	O
not	O
.	O
</s>
<s>
Command	O
and	O
control	O
servers	O
are	O
how	O
ZeuS	B-Application
Panda	I-Application
is	O
able	O
to	O
spread	O
across	O
the	O
vastness	O
of	O
the	O
world	O
but	O
also	O
remain	O
under	O
control	O
by	O
a	O
handful	O
of	O
operators	O
.	O
</s>
<s>
First	O
discovered	O
in	O
2016	O
prior	O
to	O
the	O
Olympics	O
in	O
Brazil	O
,	O
ZeuS	B-Application
Panda	I-Application
has	O
spread	O
to	O
all	O
parts	O
of	O
the	O
globe	O
in	O
similar	O
fashion	O
to	O
the	O
original	O
Zeus	O
banking	O
trojan	O
.	O
</s>
<s>
Some	O
of	O
the	O
reasons	O
are	O
likely	O
lack	O
of	O
sufficient	O
GDP	O
to	O
be	O
a	O
target	O
,	O
one	O
of	O
the	O
protected	O
areas	O
which	O
Russian	O
cybercriminals	O
do	O
not	O
attack	O
,	O
or	O
simply	O
lack	O
of	O
reporting	O
by	O
personnel	O
and	O
antivirus	B-Application
in	O
the	O
region	O
.	O
</s>
<s>
ZeuS	B-Application
Panda	I-Application
is	O
able	O
to	O
detect	O
and	O
counter	O
many	O
forensic	O
analytic	O
tools	O
and	O
sandbox	O
environments	O
.	O
</s>
<s>
Currently	O
there	O
is	O
at	O
least	O
23	O
known	O
tools	O
it	O
can	O
detect	O
and	O
if	O
any	O
of	O
them	O
are	O
found	O
on	O
the	O
system	O
,	O
ZeuS	B-Application
Panda	I-Application
stops	O
installation	O
and	O
removes	O
itself	O
from	O
the	O
system	O
.	O
</s>
<s>
It	O
does	O
so	O
by	O
inspecting	O
the	O
file	O
,	O
mutex	O
,	O
running	O
process	O
,	O
and	O
registry	B-Protocol
key	I-Protocol
.	O
</s>
<s>
After	O
the	O
anti-detection	O
and	O
analysis	O
parameters	O
are	O
met	O
,	O
ZeuS	B-Application
Panda	I-Application
will	O
deeply	O
embed	B-Architecture
itself	O
into	O
the	O
system	B-Protocol
registry	I-Protocol
.	O
</s>
<s>
It	O
will	O
looks	O
for	O
empty	O
folders	O
with	O
a	O
long	O
subfolder	O
chain	O
without	O
the	O
names	O
Microsoft	O
or	O
Firefox	B-Application
in	O
the	O
tree	O
.	O
</s>
<s>
The	O
configuration	O
settings	O
are	O
encrypted	O
with	O
RC4	B-Algorithm
and	O
AES	B-Algorithm
encryption	I-Algorithm
,	O
but	O
is	O
also	O
known	O
to	O
use	O
cryptographic	B-Algorithm
hash	I-Algorithm
functions	I-Algorithm
employing	O
SHA256	B-Algorithm
and	O
SHA1	B-Algorithm
algorithms	O
.	O
</s>
<s>
Certain	O
anti-virus	B-Application
companies	O
have	O
been	O
able	O
to	O
overcome	O
ZeuS	B-Application
Panda	I-Application
's	O
stealth	O
capabilities	O
and	O
remove	O
it	O
from	O
the	O
infected	O
system	O
.	O
</s>
<s>
Some	O
of	O
them	O
go	O
off	O
of	O
a	O
list	O
of	O
Indicators	O
of	O
Compromise	O
(	O
IoC	O
)	O
,	O
and	O
can	O
also	O
determine	O
which	O
campaign	O
the	O
version	O
of	O
ZeuS	B-Application
Panda	I-Application
originated	O
.	O
</s>
<s>
The	O
IoCs	O
are	O
signatures	O
left	O
behind	O
by	O
the	O
malware	O
as	O
well	O
as	O
IP	B-Protocol
addresses	I-Protocol
,	O
hashes	B-Error_Name
,	O
or	O
URLs	O
linked	O
to	O
command	O
and	O
control	O
servers	O
.	O
</s>
<s>
Once	O
the	O
anti-virus	B-Application
determines	O
it	O
is	O
ZeuS	B-Application
Panda	I-Application
infecting	O
the	O
system	O
,	O
it	O
goes	O
through	O
an	O
automatic	O
algorithm	O
to	O
completely	O
remove	O
it	O
and	O
its	O
loader	B-Operating_System
if	O
possible	O
.	O
</s>
