Hi! My name is Isaac Basque-Rice, I'm A Security Engineer and former Abertay Ethical Hacker, and this website is a repository for all the cool stuff I've done, enjoy!
Malware.Unknown.exe) deletes itself from disk if a non-internet connected sandbox is detectedhttp.request.full_uri contains favicon.ico
Process Name + is + [NAME OF MALWARE]Operation + contains + FileC:\Users\Public\Documents\CR433101.dat.exe
Del (delete)
favicon.icoCR432101.dat.exefavicon.ico (now called CR432101.dat.exe)Malware.Unknown.exeDropper.DownloadFromURL.exeRat.Unknown.exeAnalyst,
Excellent work with the last sample. Please take a look at the one in this directory. Our IR team said it might have command execution capabilities, but we’re not sure.
Please proceed directly with Basic Dynamic Analysis and determine:
- Network signatures
- Hist-based signatures
- Command execution capabilities, if any
- Any other findings
RE Team
floss.exe RAT.unknown.exe.malz > floss.txt

intrt explr, this is not a valid user agent (image below, 2)msdcorelib.exe), may be a second stage payload (image below, 3)
follow > HTTP Streammsdcorelib.exeserv1.ec2-102-95-13-2-ubuntu.localOperation contains File
Path contains AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
mscordll.exe in this location


nc -nv 192.168.231.128 5555
nc: netcat, the TCP/UDP swiss army knife-n: Do DNS lookups-v: verbose output192.168.231.128: the Flare-VM/Windows machine5555: the portWytdIHdoYXQgY29tbWFuZCBjYW4gSSBydW4gZm9yIHlvdQ==[+] what command can I run for youipconfig issued in netcat, output is as follows:
RAT.Unknown.exeRAT.CmdSocket.exeOperation contains TCPRAT.Unknown2.exeREADME.txt reads as follows:Analyst! Excellent work with the previous samples. You are reallly coming along with your skillset. We found another sample on an endpoint that looks similar to the last one. Give it the triage treatment and let us know what you find RE Team
cmd.exe \c, can run a commandaaaa[...]aaaa.kadusus.local
cmder as administratornano C:\Windows\System32\drivers\etc\hosts127.0.0.1aaa[...]aaa.kadusus.local so its in line with localhostProcess Name is RAT.Unknown2.exe and Operation contains TCPncat -nvip 443whoami to check and make sure