[![pingback-malware](https://thehackernews.com/images/-afhUH7aHBtQ/YJFEnD-laKI/AAAAAAAACc8/Qzf_EHlbDTgC16u0iJPKVMQfzav7X4hFwCLcBGAsYHQ/s728-e1000/pingback-malware.jpg)](<https://thehackernews.com/images/-afhUH7aHBtQ/YJFEnD-laKI/AAAAAAAACc8/Qzf_EHlbDTgC16u0iJPKVMQfzav7X4hFwCLcBGAsYHQ/s0/pingback-malware.jpg>) Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems. Called 'Pingback,' the Windows malware leverages Internet Control Message Protocol ([ICMP](<https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol>)) tunneling for covert bot communications, allowing the adversary to utilize ICMP packets to piggyback attack code, according to an [analysis](<https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/backdoor-at-the-end-of-the-icmp-tunnel/>) published today by Trustwave. Pingback ("[oci.dll](<https://www.virustotal.com/gui/file/e50943d9f361830502dcfdb00971cbee76877aa73665245427d817047523667f/details>)") achieves this by getting loaded through a legitimate service called [MSDTC](<https://en.wikipedia.org/wiki/Microsoft_Distributed_Transaction_Coordinator>) (Microsoft Distributed Transaction Coordinator) — a component responsible for handling database operations that are distributed over multiple machines — by taking advantage of a method called [DLL search order hijacking](<https://attack.mitre.org/techniques/T1574/001/>), which involves using a genuine application to preload a malicious DLL file. Naming the malware as one of the plugins required for supporting [Oracle ODBC](<https://www.oracle.com/database/technologies/releasenote-odbc-ic.html>) interface in MSDTC is key to the attack, the researchers noted. While MSDTC isn't configured to run automatically on startup, a [VirusTotal sample](<https://www.virustotal.com/gui/file/4ff77ea841544569e9da8aa3990724d1473731e684a162014ad1ad54e8c8cef2/details>) submitted in July 2020 was found to install the DLL file into the Windows System directory and start the MSDTC service to achieve persistence, raising the possibility that a separate executable is crucial to installing the malware. [![pingback-malware](https://thehackernews.com/images/-E_N9Ta1pMHY/YJFECJ_pQcI/AAAAAAAACc0/jT0BVLgz8rARBJsJjk-7qTu_rvqqKfHnwCLcBGAsYHQ/s728-e1000/icmp-data.jpg)](<https://thehackernews.com/images/-E_N9Ta1pMHY/YJFECJ_pQcI/AAAAAAAACc0/jT0BVLgz8rARBJsJjk-7qTu_rvqqKfHnwCLcBGAsYHQ/s0/icmp-data.jpg>) Upon successful execution, Pingback resorts to using the ICMP protocol for its main communication. ICMP is a network layer protocol mainly used for sending error messages and operational information, say, a failure alert when another host becomes unreachable. Specifically, Pingback takes advantage of an Echo request (ICMP message type 8), with the message sequence numbers 1234, 1235, and 1236 denoting the type of information contained in the packet — 1234 being a command or data, and 1235 and 1236 being the acknowledgment for receipt of data on the other end. Some of the commands supported by the malware include the capability to run arbitrary shell commands, download and upload files from and to the attacker's host, and execute malicious payloads on the infected machine. An investigation into the malware's initial intrusion route is ongoing. "ICMP tunneling is not new, but this particular sample piqued our interest as a real-world example of malware using this technique to evade detection," the researchers said. "ICMP is useful for diagnostics and performance of IP connections, [but] it can also be misused by malicious actors to scan and map a target's network environment. While we are not suggesting that ICMP should be disabled, we do suggest putting in place monitoring to help detect such covert communications over ICMP." Found this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter __](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.