<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>Did it ever really go away? Nope. Some threats persist, continually evolving to bypass defenses and exploit new vulnerabilities. One such persistent menace is the <span style="font-weight: bold;">Expiro</span> malware—a sophisticated file infector that has been around for over a decade and continues to wreak havoc on Windows systems worldwide.<br><br><span style="font-weight: bold;">A Surge of Infections in Zimbabwe</span><br><br>This morning, we’ve observed a massive spike in Expiro infections originating from Zimbabwe. Since Friday, October 25th, there has been a 20% increase in detected requests, indicating a significant uptick in malicious activity.&nbsp;<br><br><span style="font-weight: bold;">Understanding Expiro: The Stealthy File Infector</span><br><br>Expiro is not just any malware. It’s a file infector that embeds itself into executable files on both 32-bit and 64-bit Windows systems. By integrating its malicious code into legitimate files, Expiro makes detection and removal particularly challenging. Deleting infected files can lead to the loss of essential system components, complicating the cleanup process.<br><br><span style="font-weight: bold;">Damage Potential</span><br><br>• &nbsp; &nbsp;Data Theft and Exfiltration: Expiro is adept at stealing sensitive information, including account credentials and financial data.<br>• &nbsp; &nbsp;Espionage and Surveillance: It can monitor user activities, capturing keystrokes and screenshots.<br>• &nbsp; &nbsp;Installation of Additional Malware: Expiro often serves as a gateway for other malicious software, compounding the threat.<br>• &nbsp; &nbsp;System Manipulation and Control: It alters system settings, disables security features, and grants attackers remote access.<br>• &nbsp; &nbsp;Further Propagation: Through network shares and removable drives, Expiro spreads rapidly within connected environments.</p> <!--more--> <p><span style="font-weight: bold;">Expiro employs a variety of methods to infiltrate devices:</span><br><br>• &nbsp; &nbsp;Malicious Websites: Both fake and compromised legitimate sites can host the malware.<br>• &nbsp; &nbsp;Social Media Links: Shared images or links from compromised accounts may lead to infection.<br>• &nbsp; &nbsp;Phishing Emails: Attachments or links in deceptive emails can execute the malware.<br>• &nbsp; &nbsp;Unverified Downloads: Pirated software and unofficial updates often come bundled with Expiro.<br>• &nbsp; &nbsp;USB Drives: Manual spreading via removable media remains a common tactic.</p> <p><span style="font-weight: bold;">The Evolving Complexity of Expiro</span></p> <p>What makes Expiro particularly dangerous is its continuous evolution. Recent variants have introduced significant changes to their infection routines:<br><br>• &nbsp; &nbsp;Advanced Infection Techniques: Newer versions encrypt portions of the base relocation table within executable files, increasing detection difficulty.<br>• &nbsp; &nbsp;Dynamic Code Manipulation: Expiro decrypts and repairs relocation tables on the fly, ensuring the original file runs correctly while keeping its malicious payload hidden.<br>• &nbsp; &nbsp;Increased Analysis Complexity: Encryption and dynamic code manipulation require more sophisticated analysis and custom repair routines, hindering standard antivirus solutions.</p> <p><span style="font-weight: bold;">Protecting Yourself Against Expiro</span><br><br>Given the persistent and evolving nature of Expiro, proactive protection is essential:<br><br>• &nbsp; &nbsp;Stay Cautious Online: Be wary of unsolicited emails, social media messages, and unfamiliar websites.<br>• &nbsp; &nbsp;Use Multi-Factor Authentication: Add an extra layer of security to your accounts.<br>• &nbsp; &nbsp;Keep Software Updated: Ensure your antivirus and all software are up-to-date with the latest patches.<br>• &nbsp; &nbsp;Implement a Firewall: Monitor incoming and outgoing network traffic for suspicious activity.<br>• &nbsp; &nbsp;Download from Official Sources: Only obtain software and updates from trusted, official websites.</p> <p><span style="font-weight: bold;">How ThreatSTOP Can Protect You</span><br><br>At ThreatSTOP, our Security, Intelligence, and Research team is dedicated to crafting proactive protections against threats like Expiro. Our solutions are designed to safeguard your environment by blocking malicious activities before they can cause harm.<br><br><span style="font-weight: bold;">Protective DNS</span><br><br>Utilize our Protective DNS service—available in the cloud or on-premises—to prevent connections to malicious domains associated with Expiro. By leveraging ThreatSTOP intelligence on your DNS servers, you can block malware communication at the network level.<br><br>• &nbsp; &nbsp;Real-Time Threat Intelligence: Our continuously updated threat feeds ensure you’re protected against the latest malicious domains.<br>• &nbsp; &nbsp;Customizable Policies: Tailor your DNS policies to fit your organization’s specific needs and risk tolerance.<br>IP Defense<br><br>Our IP Defense solution allows you to manage blocklists on any IP-based system, such as routers, firewalls, IPS, or AWS WAF. By preventing Expiro from communicating with command and control servers or propagating through your network, you can effectively neutralize the threat.<br><br>• &nbsp; &nbsp;Automated Updates: Keep your network devices updated with the latest threat intelligence without manual intervention.<br>• &nbsp; &nbsp;Wide Compatibility: Support for a broad range of network devices ensures seamless integration into your existing infrastructure.</p> <p><span style="font-weight: bold;">Take Action Today</span><br><br>For those interested in joining the ThreatSTOP family or learning more about our proactive protections for all environments, we invite you to visit our <a href="/dns-defense-cloud" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have pricing for businesses of all sizes! Get started with a <a href="https://admin.threatstop.com/register?hsLang=en" rel="noopener" target="_blank">demo today</a>!<br><br><span style="font-weight: bold;">Connect with Customers, Disconnect from Risks</span></p> <hr> <p style="font-weight: bold;">Indicators of Compromise</p> <p><span style="font-weight: bold;">Associated Domains</span><br><br>Our ThreatSTOP Security, Intelligence, and Research team has identified a list of domains associated with this recent wave of infections. &nbsp;While Expiro uses a Domain Generation Algorithm (DGA), this is what we are seeing:<br><br>• &nbsp; &nbsp;acwjcqqv[.]biz<br>• &nbsp; &nbsp;anpmnmxo[.]biz<br>• &nbsp; &nbsp;bghjpy[.]biz<br>• &nbsp; &nbsp;brsua[.]biz<br>• &nbsp; &nbsp;bumxkqgxu[.]biz<br>• &nbsp; &nbsp;cjvgcl[.]biz<br>• &nbsp; &nbsp;ctdtgwag[.]biz<br>• &nbsp; &nbsp;cvgrf[.]biz<br>• &nbsp; &nbsp;cwyfknmwh[.]biz<br>• &nbsp; &nbsp;damcprvgv[.]biz<br>• &nbsp; &nbsp;dlynankz[.]biz<br>• &nbsp; &nbsp;dwrqljrr[.]biz<br>• &nbsp; &nbsp;esuzf[.]biz<br>• &nbsp; &nbsp;eufxebus[.]biz<br>• &nbsp; &nbsp;fgajqjyhr[.]biz<br>• &nbsp; &nbsp;ftxlah[.]biz<br>• &nbsp; &nbsp;fwiwk[.]biz<br>• &nbsp; &nbsp;gcedd[.]biz<br>• &nbsp; &nbsp;gjogvvpsf[.]biz<br>• &nbsp; &nbsp;gnqgo[.]biz<br>• &nbsp; &nbsp;gvijgjwkh[.]biz<br>• &nbsp; &nbsp;gytujflc[.]biz<br>• &nbsp; &nbsp;hehckyov[.]biz<br>• &nbsp; &nbsp;htwqzczce[.]biz<br>• &nbsp; &nbsp;ifsaia[.]biz<br>• &nbsp; &nbsp;iuzpxe[.]biz<br>• &nbsp; &nbsp;jdhhbs[.]biz<br>• &nbsp; &nbsp;jhvzpcfg[.]biz<br>• &nbsp; &nbsp;jpskm[.]biz<br>• &nbsp; &nbsp;jwkoeoqns[.]biz<br>• &nbsp; &nbsp;knjghuig[.]biz<br>• &nbsp; &nbsp;lejtdj[.]biz<br>• &nbsp; &nbsp;lpuegx[.]biz<br>• &nbsp; &nbsp;lrxdmhrr[.]biz<br>• &nbsp; &nbsp;mgmsclkyu[.]biz<br>• &nbsp; &nbsp;mnjmhp[.]biz<br>• &nbsp; &nbsp;muapr[.]biz<br>• &nbsp; &nbsp;myups[.]biz<br>• &nbsp; &nbsp;npukfztj[.]biz<br>• &nbsp; &nbsp;nqwjmb[.]biz<br>• &nbsp; &nbsp;ocsvqjg[.]biz<br>• &nbsp; &nbsp;oflybfv[.]biz<br>• &nbsp; &nbsp;opowhhece[.]biz<br>• &nbsp; &nbsp;oshhkdluh[.]biz<br>• &nbsp; &nbsp;przvgke[.]biz<br>• &nbsp; &nbsp;pwlqfu[.]biz<br>• &nbsp; &nbsp;pywolwnvd[.]biz<br>• &nbsp; &nbsp;qaynky[.]biz<br>• &nbsp; &nbsp;qpnczch[.]biz<br>• &nbsp; &nbsp;reczwga[.]biz<br>• &nbsp; &nbsp;rrqafepng[.]biz<br>• &nbsp; &nbsp;rynmcq[.]biz<br>• &nbsp; &nbsp;saytjshyf[.]biz<br>• &nbsp; &nbsp;ssbzmoy[.]biz<br>• &nbsp; &nbsp;sxmiywsfv[.]biz<br>• &nbsp; &nbsp;tbjrpv[.]biz<br>• &nbsp; &nbsp;tnevuluw[.]biz<br>• &nbsp; &nbsp;typgfhb[.]biz<br>• &nbsp; &nbsp;uaafd[.]biz<br>• &nbsp; &nbsp;uevrpr[.]biz<br>• &nbsp; &nbsp;uhxqin[.]biz<br>• &nbsp; &nbsp;vcddkls[.]biz<br>• &nbsp; &nbsp;vjaxhpbji[.]biz<br>• &nbsp; &nbsp;vrrazpdh[.]biz<br>• &nbsp; &nbsp;vyome[.]biz<br>• &nbsp; &nbsp;warkcdu[.]biz<br>• &nbsp; &nbsp;whjovd[.]biz<br>• &nbsp; &nbsp;wllvnzb[.]biz<br>• &nbsp; &nbsp;wxgzshna[.]biz<br>• &nbsp; &nbsp;xccjj[.]biz<br>• &nbsp; &nbsp;xlfhhhm[.]biz<br>• &nbsp; &nbsp;yauexmxk[.]biz<br>• &nbsp; &nbsp;yhqqc[.]biz<br>• &nbsp; &nbsp;yunalwv[.]biz<br>• &nbsp; &nbsp;ywffr[.]biz<br>• &nbsp; &nbsp;zjbpaao[.]biz<br>• &nbsp; &nbsp;zlenh[.]biz<br>• &nbsp; &nbsp;znwbniskf[.]biz<br>• &nbsp; &nbsp;zyiexezl[.]biz<br><br>If you notice any communication with these domains within your network traffic, it’s a strong indicator of a potential Expiro infection.</p></span>