Hi! My name is Isaac Basque-Rice, I'm A Security Engineer and former Abertay Ethical Hacker, and this website is a repository for all the cool stuff I've done, enjoy!
Malware.Unknown.exe
) deletes itself from disk if a non-internet connected sandbox is detectedhttp.request.full_uri contains favicon.ico
Process Name
+ is
+ [NAME OF MALWARE]
Operation
+ contains
+ File
C:\Users\Public\Documents\CR433101.dat.exe
Del
(delete)favicon.ico
CR432101.dat.exe
favicon.ico
(now called CR432101.dat.exe
)Malware.Unknown.exe
Dropper.DownloadFromURL.exe
Rat.Unknown.exe
Analyst,
Excellent work with the last sample. Please take a look at the one in this directory. Our IR team said it might have command execution capabilities, but we’re not sure.
Please proceed directly with Basic Dynamic Analysis and determine:
- Network signatures
- Hist-based signatures
- Command execution capabilities, if any
- Any other findings
RE Team
floss.exe RAT.unknown.exe.malz > floss.txt
intrt explr
, this is not a valid user agent (image below, 2)msdcorelib.exe
), may be a second stage payload (image below, 3)follow > HTTP Stream
msdcorelib.exe
serv1.ec2-102-95-13-2-ubuntu.local
Operation contains File
Path contains AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
mscordll.exe
in this location
nc -nv 192.168.231.128 5555
nc
: netcat, the TCP/UDP swiss army knife-n
: Do DNS lookups-v
: verbose output192.168.231.128
: the Flare-VM/Windows machine5555
: the portWytdIHdoYXQgY29tbWFuZCBjYW4gSSBydW4gZm9yIHlvdQ==
[+] what command can I run for you
ipconfig
issued in netcat, output is as follows:RAT.Unknown.exe
RAT.CmdSocket.exe
Operation contains TCP
RAT.Unknown2.exe
README.txt
reads as follows:Analyst! Excellent work with the previous samples. You are reallly coming along with your skillset. We found another sample on an endpoint that looks similar to the last one. Give it the triage treatment and let us know what you find RE Team
cmd.exe \c
, can run a commandaaaa[...]aaaa.kadusus.local
cmder
as administratornano C:\Windows\System32\drivers\etc\hosts
127.0.0.1
aaa[...]aaa.kadusus.local
so its in line with localhost
Process Name is RAT.Unknown2.exe
and Operation contains TCP
ncat -nvip 443
whoami
to check and make sure