Malware Analysis
cyberc0re
1. Malware.Unknown.exe
File hash & VT Analysis
92730427321a1c4ccfc0d0580834daef98121efa9bb8963da332bfd6cf1fda8a <Malware.Unknown.exe.malz>
1d8562c0adcaee734d63f7baaca02f7c
<Malware.Unknown.exe.malz>
Basics Static Analysis
#Floss Malware.Unknown.exe.malz
Note: Most of the important Strings were found at the end.
IAT & PEView
Windows API calls:
- DowloadFromURL
- InternetOpenURLA
- ShellExec
Basic Dynamic Analysis
- Host and Network Indicators
Host |
Network |
1. Delete Files. |
1. Calls out to a Domain. |
2. Install Persistence. |
2. Downloads a file. |
Network Signature
- Wireshark has been used to find the Network Signatures
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Host Indicator
- If inetsim was not running, the Malware is designed to self delete once it is detonated as it wouldn't be able to fetch request from the DNS. So, once I terminated inetsim in my Remnux terminal the Malware deleted itself, when I tried to detonate again.
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
- Program execution flow
If URL exists
-> Download favicon.ico
-> Run favicon.ico
If URL doesn't exists
-> Delete from disk
-> Do not run
Name: Dropper.DownloadFromURL.exe
2. RAT.Unknown.exe.malz (Dynamic Analysis)
Initial Detonation
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Wireshark observation after detonation.
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Dechaining/ Decoupling: The data can be transmitted first and can be written into the disk with some other name.
#Potential File Download -> msdcorelib.exe
Host Base Indicators
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
-
Persistence Binary File:
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
-
TCP Socket in Listening State:
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
-
Command Injecting Capabilities:
Image Not Showing
Possible Reasons
- The image file may be corrupted
- The server hosting the image is unavailable
- The image path is incorrect
- The image format is not supported
Learn More →
Note: This is a "Bind shell script", a Trojan that can be remotely connected.