Posted: April 21, 2020

Kazuar Description

Kazuar is a backdoor Trojan with ties to the Turla APT, a Russian threat actor that specializes in spying-based hacking. Kazuar includes many of the characteristic features of this Trojan kind, such as initiating system commands or modifying files, as well as an unusual, server-based communications option that may hide its network contacts. Users of Windows, macOS, or Unix-based systems alike should have anti-malware protection for removing Kazuar safely and change all at-risk passwords as soon as possible afterward.

A Bird Too Large for Any One OS to Handle

Backdoor Trojans are one of the broader categories of threats. They can include Trojans with incredibly expansive, modular capabilities, alongside programs that do little more than ping a server and await a response. Kazuar, named after Southeast Asia's cassowary, leans more to the traditional side of its kind. Victims underestimating its capabilities, however, will find that the Turla APT is maintaining it with a few 'surprise' features that make it more compatible and evasive than their other tools, like Neuron or PowerStallion.

As with both of those backdoor Trojans, Kazuar's purpose is avoiding detection while the Turla APT's hackers acquire intelligence from desirable targets. Unlike them, Kazuar, despite being a .NET Framework application, also shows features facilitating its compatibility with Unix systems and Mac-brand ones. That said, our malware experts only have hard confirmation of Windows samples.

Kazuar has significant work put into its setup routine and may adapt itself to vulnerable PCs through different persistence methods, such as memory-injected DLLs, a Windows service, or a built-in .NET Framework function. Once it's working, Kazuar provides the attacker (or a presumably-Russian spy) with many system-controlling capabilities, including screenshots, file uploads, webcam captures, copying files, launching EXEs, and proffering other attacks via optional modules.

The API feature also is worthy of noting unto itself. Ordinarily, Kazuar sends requests to its Command & Control server and waits for a response. Optionally, the threat actor can command Kazuar to create an always-listening Web server with API support. Doing so inverts the organizational flow of the C&C contact and may help Kazuar with avoiding firewalls and services that monitor outbound requests from the infected PCs.

Don't Get Confused by an Obfuscated Trojan

Kazuar is one of many threats (see also the Galacti-Crypter Ransomware or RANWare) that uses the free ConfuserEx for obfuscating its code. The Trojan also may hibernate indefinitely and contains an apparent uninstallation feature. When taken alongside its other elements and structure, it's evident that the Turla APT isn't neglecting anti-detection as a priority for their intelligence operations.

As stated before, Kazuar endangers more than just Windows systems and has a particularly adaptable means of guaranteeing its installation and persistence. Malware experts haven't seen it in use outside of apparent Turla APT campaigns, but for affected users, it represents an almost total loss of privacy or control over their files. Its deployment is, most likely, using a multi-stage attack with an initial Trojan dropper or downloader as the first stage, with Kazuar as the follow-up.

Users in vulnerable environments should protect themselves through anti-malware tools for deleting Kazuar on sight, as well as by observing possible infection vectors (e-mail attachments particularly).

Many of Kazuar's moving gears are nothing more than reused code and features that were apparent in older parts of these Russian hackers' toolkit previously. Where it innovates, however, is more than a little concerning, since the possibility of a Trojan infecting more than one operating system makes for a spying operation with truly invasive, and technically-sophisticated, goals.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Kazuar may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria.

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Leave a Reply

Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter. If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.