Threat Advisory: HIDDEN COBRA FASTCash-Related Malware
October 3, 2018
Herjavec Group circulates US – Cert advisories as this notification warrants attention and may have significance to your Enterprise network environment. If the following advisory is applicable to your environment, Herjavec Group recommends your IT team review the technical details included and monitor your environment for any susceptible systems. Herjavec Group’s analysts are working with applicable vendor partners to apply detection and mitigation strategies where appropriate. For Managed Services customers, our Managed Services team will engage with the appropriate technical contacts in your respective organizations directly to provide alerts, escalations, actions and or reports based our service agreement with you. If you have questions or concerns, please engage your Herjavec Group account representative directly or contact Herjavec Group.
Notification
This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp.
Summary
Description
Ten (10) files were submitted to NCCIC for analysis.
Four (4) files are malicious applications, obfuscated using a file encryption tool called Themida. When executed on a computer running Windows, the malware unpacks a payload that is loaded directly into the memory of the compromised system.
Once installed, this malware modifies the Windows Firewall to allow incoming connections and installs a proxy server application. In addition, the malware has the ability to exfiltrate data, install and run secondary payloads, and provide proxy capabilities on a compromised system.
Two (2) files are command-line utility applications. Three (3) files are applications designed to provide export functions and methods that allow the application to interact with financial systems and perform transactions. One (1) file is a log file.
Two (2) additional samples in the report include unpacked files contained within the following samples:
820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6 and 4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756
For a downloadable copy of IOCs, see:
- MAR-10201537.stix
Submitted Files (10)
10ac312c8dd02e417dd24d53c99525c29d74dcbc84730351ad7a4e0a4b1a0eba (Lost_File.so)
3a5ba44f140821849de2d82d5a137c3bb5a736130dddb86b296d94e6b421594c (Lost_File1_so_file)
4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756 (4f67f3e4a7509af1b2b1c6180a03b3...)
820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6 (5cfa1c2cb430bec721063e3e2d144f...)
a9bc09a17d55fc790568ac864e3885434a43c33834551e027adb1896a463aafc (8efaabb7b1700686efedadb7949eba...)
ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629 (d0a8e0b685c2ea775a74389973fc92...)
ca9ab48d293cc84092e8db8f0ca99cb155b30c61d32a1da7cd3687de454fe86c (2.so)
d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee (Injection_API_executable_e)
e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8 (Injection_API_log_generating_s...)
f3e521996c85c0cdb2bfb3a0fd91eb03e25ba6feef2ba3a1da844f1b17278dd2 (inject_api)
Additional Files (2)
1f2cd2bc23556fb84a51467fedb89cbde7a5883f49e3cfd75a241a6f08a42d6d (Unpacked_dump_4a740227eeb82c20...)
9ddacbcd0700dc4b9babcd09ac1cebe23a0035099cb612e6c85ff4dffd087a26 (Unpacked_dump_820ca1903a305162...)
IPs (1)
75.99.63.27
Findings
820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6
Tags
backdoortrojan
Details
Name | 5cfa1c2cb430bec721063e3e2d144feb |
---|---|
Size | 1643616 bytes |
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 5cfa1c2cb430bec721063e3e2d144feb |
SHA1 | c1a9044f180dc7d0c87e256c4b9356463f2cb7c6 |
SHA256 | 820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6 |
SHA512 | a65e615203269b657e55fe842eca0542a4cd3bac80d3039d85dfb5fbbfdb5768bbabe2fc86f213fb1a759124a82780a1cfbb9fd8457f4923cefad73e9db6f6a4 |
ssdeep | 24576:LTxUZWB9BdhYaqJ+LkDWo+eIgV10M/w6weSx4y4Golx+Q/K:LVUZWTjoSkz+eIg/z/YxFasgK |
Entropy | 7.957226 |
Antivirus
Ahnlab | Trojan/Win32.Agent |
---|---|
Antiy | Trojan/Win32.BTSGeneric |
Avira | BDS/RMS.ejnsf |
BitDefender | Trojan.GenericKD.30382654 |
Cyren | W32/Trojan.KBJG-8883 |
ESET | a variant of Win32/Packed.Themida.AOO trojan |
Emsisoft | Trojan.GenericKD.30382654 (B) |
Ikarus | Trojan.Win32.Themida |
McAfee | Trojan-FPWN!5CFA1C2CB430 |
NANOAV | Trojan.Win32.RMS.ewarws |
NetGate | Trojan.Win32.Malware |
Symantec | Trojan.Gen.2 |
TrendMicro | TROJ_FR.15C6BFCA |
TrendMicro House Call | TROJ_FR.15C6BFCA |
VirusBlokAda | Backdoor.RMS |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2017-08-14 13:14:04-04:00 |
---|---|
Import Hash | baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
23041caef38d4991296ffbe42743c691 | header | 4096 | 0.825738 |
da701d0e0ab6bfbddd747feebed96546 | 156672 | 7.983417 | |
d41d8cd98f00b204e9800998ecf8427e | .rsrc | 0 | 0.000000 |
efcb51d4d8a55d441d194e80899bb2b0 | .idata | 512 | 1.308723 |
231617ad2dc2a0c3f2d8e3241c57626f | 512 | 0.240445 | |
92a0680fea369ae11f900c1a92e5499c | gvxlrmcr | 1474048 | 7.954645 |
cf68e5165e3b89c0ece9b4905abf861a | eolnwoiw | 512 | 3.342017 |
Process List
Process | PID | PPID |
---|---|---|
820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6.exe | 2104 | (2084) |
lsass.exe | 468 | (384) |
Description
This application is a Themida-packed 32-bit Windows executable. This application unpacks and executes a service proxy module in memory (5c0a4f9e67ced69eaea17092444b2c1a).
Analysis indicates that this proxy module accepts command-line parameters to perform its functions. The module modifies the Windows Firewall on the victim’s machine to allow for incoming connections and to force the compromised system to function as a proxy server.
The proxy module uses the following command to open a Windows Firewall port on the victim’s machine to allow for incoming connections:
--Begin firewall modification--
"netsh firewall add portopening TCP <port> RPCServer"
--End firewall modification--
The malware listens to an open port for incoming traffic. The traffic may contain instructions to perform any of the following functions:
-Retrieve information about the logon sessions, drives installed, and operating system
-Search for files
-Execute processes
-Terminate processes
-Delete files
-Execute commands
-Download and upload files
-Read files
-Write files
-Compress and decompress files
This malware uses the multi-protocol file transfer library "libcurl 7.49.1" for transferring data with a URL syntax. It supports the following network protocols:
-POP3
-SMTP
-IMAP
-LDAP
-DICT
-FTP
-HTTP
-HTTPS
9ddacbcd0700dc4b9babcd09ac1cebe23a0035099cb612e6c85ff4dffd087a26
Tags
trojan
Details
Name | Unpacked_dump_820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6.exe |
---|---|
Size | 4247040 bytes |
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | 5c0a4f9e67ced69eaea17092444b2c1a |
SHA1 | 8462cb955a6c459036a3e27d59b1b8b6cc9acfd5 |
SHA256 | 9ddacbcd0700dc4b9babcd09ac1cebe23a0035099cb612e6c85ff4dffd087a26 |
SHA512 | 3a0f668d5ae4998ad6555adccbfcf837eabee2dcb2e36a3c9cad8efe0996a5a7ba238041b8f31b1e2feb36165daac0c6b5fe70e4df5339dce0aa0d031d455dec |
ssdeep | 98304:mv9KZUELYbD09b2WBFs6BEroKso7aO7/Qs7K:mwZHs6BaoE71MEK |
Entropy | 6.823899 |
Antivirus
Ahnlab | Trojan/Win32.Agent |
---|---|
BitDefender | Gen:Trojan.Heur.PT.@BW@bq9rd7j |
Emsisoft | Gen:Trojan.Heur.PT.@BW@bq9rd7j (B) |
Symantec | Heur.AdvML.B |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2017-08-14 13:14:04-04:00 |
---|---|
Import Hash | baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
22f49b12cb818728d293ae43082d8949 | header | 1024 | 2.661805 |
01c0e5316c7bba2ebdc00754a1d83f2a | 311296 | 6.307203 | |
d41d8cd98f00b204e9800998ecf8427e | .rsrc | 0 | 0.000000 |
5e501430acba545b719c0887357226dd | .idata | 1024 | 0.778128 |
37fabfab797e631603a696b7ac2296d7 | 2459136 | 5.741823 | |
c10780e19363abda168c5861ce481635 | gvxlrmcr | 1474048 | 7.954349 |
671f4fb0c657d89c924064db6be0442e | eolnwoiw | 512 | 3.326839 |
Description
This file is the unpacked version of 820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6.
Displayed below are strings of interest for this unpacked proxy module:
--Begin strings of interest--
http
libcurl/7.49.1
%s:%d
%255[^:]:%d:%255s
%255[^:]:%d
<no protocol>
%I64u-
ALL_PROXY
all_proxy
http_proxy
_proxy
NO_PROXY
no_proxy
%s://%s%s%s:%hu%s%s%s
;type=%c
[%*45[0123456789abcdefABCDEF:.]%c
ftp@example.com
anonymous
%s%s%s
User-Agent: %s
Set-Cookie:
RELOAD
FLUSH
SESS
identity
socks
socks4
socks4a
socks5
socks5h
pop3
POP3.
smtp
SMTP.
IMAP
IMAP.
LDAP
LDAP.
DICT
DICT.
FTP.
/?]%[^
%15[^
:]://%[^
/?]%[^
file
%15[^:]:%[^
%s://%s
FALSE
TRUE
#HttpOnly_
expires
max-age
version
domain
path
httponly
secure
%1023[^;
=] =%4999[^;
%s%s%s
%I64d
unknown
# Fatal libcurl error
# Netscape HTTP Cookie File
# https://curl.haxx.se/docs/http-cookies.html
# This file was generated by libcurl! Edit at your own risk.
none
[%s %s %s]
from
Header
Data
host!
0123456789abcdefghijklmnopqrstuvwxyz
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
(nil)
(nil)
.%ld
0123456789
%d.%d.%d.%d
HTTP
%sAuthorization: Basic %s
Proxy-
%s:%s
Basic
Authorization:
Proxy-authorization:
Digest
NTLM
HTTP/
Expect: 100-continue
100-continue
Expect:
Connection
Content-Length
Content-Type:
Host:
If-Modified-Since: %s
If-Unmodified-Since: %s
Last-Modified: %s
%s, %02d %s %4d %02d:%02d:%02d GMT
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
Content-Length: %I64d
Content-Length:
%s%s
%s%s=%s
Cookie:
%s HTTP/%s
%s%s%s%s%s%s%s%s%s%s
ftp://%s:%s@%s
Content-Range: bytes %s/%I64d
Content-Range: bytes %s%I64d/%I64d
Content-Range: bytes 0-%I64d/%I64d
Content-Range:
Range: bytes=%s
Range:
Host: %s%s%s:%hu
Host: %s%s%s
Accept: */*
Accept:
;type=
ftp://
Transfer-Encoding: chunked
chunked
Transfer-Encoding:
Accept-Encoding: %s
Accept-Encoding:
Cookie:
Referer: %s
Referer:
User-Agent:
POST
HEAD
Location:
Proxy-authenticate:
WWW-Authenticate:
Last-Modified:
Content-Encoding:
x-gzip
gzip
deflate
Connection:
close
Proxy-Connection:
keep-alive
Server:
RTSP/%d.%d %3d
HTTP %3d
HTTP/%d.%d %d
%hu.%hu.%hu.%hu
HTTP/1.%d %d
CONNECT %s HTTP/%s
%s%s%s
Host: %s
%s%s%s:%hu
CONNECT
%s:%hu
default
machine
password
login
_netrc
HOME
c%c==
%c%c%c=
%c%c%c%c
application/xml
.xml
text/html
.html
text/plain
.txt
.jpeg
image/jpeg
.jpg
image/gif
.gif
; filename="%s"
------------------------%08x%08x
--%s--
--%s--
Content-Type: %s
--%s
Content-Disposition: attachment
Content-Type: multipart/mixed; boundary=%s
Content-Disposition: form-data; name="
--%s
%s; boundary=%s
Content-Type: multipart/form-data
Out of memory
Bad content-encoding found
Write error
Malformed encoding found
Illegal or missing hexadecimal sequence
Too long hexadecimal number
%02x
auth-int
auth
%08x%08x%08x%08x
%s, algorithm="%s"
%s, opaque="%s"
username="%s", realm="%s", nonce="%s", uri="%s", response="%s"
username="%s", realm="%s", nonce="%s", uri="%s", cnonce="%s", nc=%08x, qop=%s, response="%s"
%s:%s:%08x:%s:%s:%s
d41d8cd98f00b204e9800998ecf8427e
%s:%s:%s
MD5-sess
algorithm
opaque
realm
true
stale
nonce
NTLMSSP
NTLMSSP%c
%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%s%s
NTLMSSP%c
%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c
%c%c%c%c%c%c%c%c
KGS!@#$%
%c%c%c%c
out of memory
1.2.8
internal error: deflate stream corrupt
requested length does not fit in int
deflate 1.2.8 Copyright 1995-2013 Jean-loup Gailly and Mark Adler
1.2.8
--End strings of interest--
4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756
Tags
backdoortrojan
Details
Name | 4f67f3e4a7509af1b2b1c6180a03b3e4 |
---|---|
Size | 2206296 bytes |
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 4f67f3e4a7509af1b2b1c6180a03b3e4 |
SHA1 | 1c9a437ed876a0ce0e5374bd93acdfd9e9023f1f |
SHA256 | 4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756 |
SHA512 | aa310ce7bb649c7bac9295ec0e68c15d595a2bea79c4d0fb22cd13779deee02a04df2824f5583a8cc5f249659474feeb5f647b0a875fe2bc663d8e4c34275316 |
ssdeep | 49152:9ywn1c6Q+lkOpdHyjyDMXSfRndy7vdaCYzQ7cxTEhr2nvoBPVis8M:Ja6HtHk+nojUT6r2nvoB/ |
Entropy | 7.956937 |
Antivirus
Ahnlab | Trojan/Win64.Agent |
---|---|
BitDefender | Trojan.Generic.22876704 |
Cyren | W64/Trojan.LTPJ-3011 |
ESET | Win64/NukeSped.AA trojan |
Emsisoft | Trojan.Generic.22876704 (B) |
Ikarus | Trojan.Win64.Nukesped |
McAfee | Trojan-FPWN!4F67F3E4A750 |
Microsoft Security Essentials | Trojan:Win64/NukeSped |
NANOAV | Trojan.Win64.RMS.facjgp |
Quick Heal | Trojan.IGENERIC |
Sophos | Troj/NukeSped-H |
Symantec | Trojan.Gen.2 |
TrendMicro | Trojan.C9DEC062 |
TrendMicro House Call | Trojan.C9DEC062 |
Vir.IT eXplorer | Backdoor.Win32.RMS.EN |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2017-08-14 13:14:12-04:00 |
---|---|
Import Hash | baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
4bd1bcb9809fedb1d4f556b695fb95a6 | header | 4096 | 0.868689 |
32f3f5b6711f8cb1c9655b615701f50d | 184832 | 7.922033 | |
d41d8cd98f00b204e9800998ecf8427e | .rsrc | 0 | 0.000000 |
74c1d1ec299d8a058f22b61277ceea66 | .idata | 512 | 1.297004 |
f4facb792a8404ec46a8119da73d6ec4 | 512 | 0.231158 | |
075fa8edf884d5a43ba9a96c4b20de25 | twvngiow | 1994240 | 7.960560 |
a1785d4faeedfebd99e0cc737f38f551 | pavwhbmc | 512 | 4.473835 |
5af578a4785cc0683866fa19e262eb4d | .pdataI | 14336 | 5.546603 |
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 468 | (384) |
4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756.exe | 2120 | (2152) |
Description
This application is a Themida--packed 64-bit Windows executable. This application unpacks and executes a service proxy module in memory (02959903cd988443e5ef519d556b34b0).
Analysis indicates that this proxy module accepts command-line parameters to perform its functions. The module modifies the Windows Firewall on the victim’s machine to allow for incoming connections and forces the compromised system to function as a proxy server.
The proxy module uses the following command to open a Windows Firewall port on the victim’s machine to allow for incoming connections:
--Begin firewall modification--
"netsh firewall add portopening TCP <port> RPCServer"
--End firewall modification--
The malware listens to an open port for incoming traffic. The traffic may contain instructions to perform any of the following functions:
-Retrieve information about the logon sessions, drives installed, and operating system
-Search for files
-Execute processes
-Terminate processes
-Delete files
-Execute commands
-Download and upload files
-Read files
-Write files
-Compress and decompress files
This malware used the multi-protocol file transfer library "libcurl 7.49.1" for transferring data with a URL syntax. It supports the following network protocols:
-POP3
-SMTP
-IMAP
-LDAP
-DICT
-FTP
-HTTP
-HTTPS
1f2cd2bc23556fb84a51467fedb89cbde7a5883f49e3cfd75a241a6f08a42d6d
Tags
trojan
Details
Name | Unpacked_dump_4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756.exe |
---|---|
Size | 5889536 bytes |
Type | PE32+ executable (console) x86-64, for MS Windows |
MD5 | 02959903cd988443e5ef519d556b34b0 |
SHA1 | 18e346aa6ee6d3faeae21474f33f5a4601a99213 |
SHA256 | 1f2cd2bc23556fb84a51467fedb89cbde7a5883f49e3cfd75a241a6f08a42d6d |
SHA512 | cc20d9105f0f91c443a6b6c156bfccde81a1b7fa7a9267c156b9129dece9ddeba706d9d1c49da47d54387ade63e1fe2ecc79743f51de1cf92ee23603dba71761 |
ssdeep | 98304:s0Mu3F1FKHTTEB/oVHhOEVHtHk+nojUT6r2nvoB:sQ/F0TQ/oVBOEjHk+aUTXoB |
Entropy | 6.820153 |
Antivirus
ESET | a variant of Win64/NukeSped.AS trojan |
---|
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2017-08-14 13:14:12-04:00 |
---|---|
Import Hash | baa93d47220682c04d92f7797d9224ce |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
a425d258e0ddf17fe412040b81d41aac | header | 1024 | 2.802251 |
9cfb80616de943facef57fabbece780a | 374784 | 6.195005 | |
d41d8cd98f00b204e9800998ecf8427e | .rsrc | 0 | 0.000000 |
55e1897e20dbef5db7b4a718fd539ef7 | .idata | 1024 | 0.797549 |
83734ab1f8e17720271dc4b429ea0f6c | 3503616 | 5.733920 | |
18f194fd3ae2455d8e26aad2e0dd6685 | twvngiow | 1994240 | 7.960332 |
5fa71bdf383d16a6b25955bff53efb90 | pavwhbmc | 512 | 4.459428 |
5af578a4785cc0683866fa19e262eb4d | .pdataI | 14336 | 5.546603 |
Description
This file is the unpacked version of 4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756.
Displayed below are strings of interest for this unpacked proxy module:
--Begin strings of interest--
http
libcurl/7.49.1
%s:%d
%255[^:]:%d:%255s
%255[^:]:%d
<no protocol>
%I64u-
ALL_PROXY
all_proxy
http_proxy
_proxy
NO_PROXY
no_proxy
%s://%s%s%s:%hu%s%s%s
;type=%c
[%*45[0123456789abcdefABCDEF:.]%c
ftp@example.com
anonymous
%s%s%s
User-Agent: %s
Set-Cookie:
RELOAD
FLUSH
SESS
identity
socks
socks4
socks4a
socks5
socks5h
pop3
POP3.
smtp
SMTP.
IMAP
IMAP.
LDAP
LDAP.
DICT
DICT.
FTP.
/?]%[^
%15[^
:]://%[^
/?]%[^
file
%15[^:]:%[^
%s://%s
FALSE
TRUE
#HttpOnly_
expires
max-age
version
domain
path
httponly
secure
%1023[^;
=] =%4999[^;
%s%s%s
%I64d
unknown
# Fatal libcurl error
# Netscape HTTP Cookie File
# https://curl.haxx.se/docs/http-cookies.html
# This file was generated by libcurl! Edit at your own risk.
none
[%s %s %s]
from
Header
Data
host!
0123456789abcdefghijklmnopqrstuvwxyz
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
(nil)
(nil)
.%ld
0123456789
%d.%d.%d.%d
HTTP
%sAuthorization: Basic %s
Proxy-
%s:%s
Basic
Authorization:
Proxy-authorization:
Digest
NTLM
HTTP/
Expect: 100-continue
100-continue
Expect:
Connection
Content-Length
Content-Type:
Host:
If-Modified-Since: %s
If-Unmodified-Since: %s
Last-Modified: %s
%s, %02d %s %4d %02d:%02d:%02d GMT
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
Content-Length: %I64d
Content-Length:
%s%s
%s%s=%s
Cookie:
%s HTTP/%s
%s%s%s%s%s%s%s%s%s%s
ftp://%s:%s@%s
Content-Range: bytes %s/%I64d
Content-Range: bytes %s%I64d/%I64d
Content-Range: bytes 0-%I64d/%I64d
Content-Range:
Range: bytes=%s
Range:
Host: %s%s%s:%hu
Host: %s%s%s
Accept: */*
Accept:
;type=
ftp://
Transfer-Encoding: chunked
chunked
Transfer-Encoding:
Accept-Encoding: %s
Accept-Encoding:
Cookie:
Referer: %s
Referer:
User-Agent:
POST
HEAD
Location:
Proxy-authenticate:
WWW-Authenticate:
Last-Modified:
Content-Encoding:
x-gzip
gzip
deflate
Connection:
close
Proxy-Connection:
keep-alive
Server:
RTSP/%d.%d %3d
HTTP %3d
HTTP/%d.%d %d
%hu.%hu.%hu.%hu
HTTP/1.%d %d
CONNECT %s HTTP/%s
%s%s%s
Host: %s
%s%s%s:%hu
CONNECT
%s:%hu
default
machine
password
login
_netrc
HOME
c%c==
%c%c%c=
%c%c%c%c
application/xml
.xml
text/html
.html
text/plain
.txt
.jpeg
image/jpeg
.jpg
image/gif
.gif
; filename="%s"
------------------------%08x%08x
--%s--
--%s--
Content-Type: %s
--%s
Content-Disposition: attachment
Content-Type: multipart/mixed; boundary=%s
Content-Disposition: form-data; name="
--%s
%s; boundary=%s
Content-Type: multipart/form-data
Out of memory
Bad content-encoding found
Write error
Malformed encoding found
Illegal or missing hexadecimal sequence
Too long hexadecimal number
%02x
auth-int
auth
%08x%08x%08x%08x
%s, algorithm="%s"
%s, opaque="%s"
username="%s", realm="%s", nonce="%s", uri="%s", response="%s"
username="%s", realm="%s", nonce="%s", uri="%s", cnonce="%s", nc=%08x, qop=%s, response="%s"
%s:%s:%08x:%s:%s:%s
d41d8cd98f00b204e9800998ecf8427e
%s:%s:%s
MD5-sess
algorithm
opaque
realm
true
stale
nonce
NTLMSSP
NTLMSSP%c
%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%s%s
NTLMSSP%c
%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c
%c%c%c%c%c%c%c%c
KGS!@#$%
%c%c%c%c
out of memory
1.2.8
internal error: deflate stream corrupt
requested length does not fit in int
deflate 1.2.8 Copyright 1995-2013 Jean-loup Gailly and Mark Adler
1.2.8
--End strings of interest--
ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629
Tags
trojan
Details
Name | d0a8e0b685c2ea775a74389973fc92ca |
---|---|
Size | 122880 bytes |
Type | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5 | d0a8e0b685c2ea775a74389973fc92ca |
SHA1 | c752ad74cb99a836eec4b984dab03cb7e99eb974 |
SHA256 | ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629 |
SHA512 | 6ec195aa1ec3226252f4959c0abbe0db06645e5b3dea8351d2da8dfb87cce71ce1424159e325fa6a77bf2fe4f0a3181e1ed23f4eb17db6bdc119e4fec7273416 |
ssdeep | 3072:pNwZ4j/a2NlHbAoTL4592kHhEBZTWTBfg09ruXlN:pNwZ4zaibAoTL45oMEPWTBp9ruXl |
Entropy | 6.098281 |
Antivirus
Ahnlab | Trojan/Win32.Alreay |
---|---|
Antiy | Trojan[Banker]/Win32.Alreay |
BitDefender | Gen:Variant.Graftor.364318 |
Cyren | W32/Heuristic-KPP!Eldorado |
ESET | a variant of Win32/NukeSped.CK trojan |
Emsisoft | Gen:Variant.Graftor.364318 (B) |
K7 | Riskware ( 0040eff71 ) |
McAfee | Generic Trojan.aa |
Symantec | Heur.AdvML.C |
TACHYON | Trojan.Generic.18331628 |
Zillya! | Trojan.Agent.Win32.722146 |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2016-03-19 14:03:05-04:00 |
---|---|
Import Hash | 4215312bc485628dca703e26b9c891d0 |
Company Name | None |
File Description | Resource cache builder tool |
Internal Name | mcbuilder.exe |
Legal Copyright | ⓒ Microsoft Corporation. All rights reserved. |
Original Filename | None |
Product Name | Microsoft® Windows® Operating System |
Product Version | 6.2.9200.16384 |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
e31fd661c75ca688e967a8cb3acaf667 | header | 4096 | 0.719150 |
ee501cdb0da38b6674f2156044a7c4fa | .text | 81920 | 6.357905 |
01772205e022a2ffd1809a471bd44333 | .rdata | 20480 | 6.533817 |
6292ff91b59460d11cb00c8553b79b2d | .data | 12288 | 3.569966 |
c8d0ecf5c22d5806a5af87953844408c | .rsrc | 4096 | 1.146235 |
Packers/Compilers/Cryptors
Microsoft Visual C++ v6.0 |
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 468 | (384) |
ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629.exe | 2344 | (2104) |
Relationships
ab88f12f0a... | Contains | 75.99.63.27 |
Description
This application is a 32-bit Windows executable. This application executes as a service named "helpsvcs." The application utilizes the Rivest Cipher 4 (RC4) encryption algorithm to encrypt configuration data. It stores a four-byte unique identifier, RC4 key, and the encrypted configuration data in the following registry:
--Begin registry key--
hKey = HKEY_LOCAL_MACHINE
Subkey = "SYSTEM\CurrentControlSet\Services\Security" ValueName = "Data1"
ValueData = "Encrypted configuration data"
hKey = HKEY_LOCAL_MACHINE
Subkey = "SYSTEM\CurrentControlSet\Services\PVS\Security" ValueName = "Data1"
ValueData = "Encrypted configuration data"
--End registry key--
Displayed below is the RC4 key for encrypting and decrypting the configuration data:
--Begin RC4 key--
11 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00
--End RC4 key--
Displayed below is the hard-coded configuration data, which contains command and control (C2) information:
--Begin hard-coded configuration data--
FF 04 00 02 00 00 00 04 FF 08 00 00 4B 63 3F 1B ===> 75.99.63.27
00 00 00 00 FF 02 00 01 BB 01 FF 04 00 04 00 00 ===> port 443
00 00 FF 04 00 03 3C 00 00 00 FF 04 00 05 00 00
00 00 FF 04 00 08 01 00 00 00 FF 04 00 06 00 00
00 00 FF 00 00 09 00 FF 00 00 0A 00 FF 00 00 0B
00 FF 00 00 0C 00 FF 00 00 0D 00 FF 00 00 0E 00
FF 04 00 07 00 00 00 00 FD
--End hard-coded configuration data--
Displayed below is the data stored in the registry to include the four byte unique identifier, RC4 key, and the encrypted configuration data:
--Begin configuration data--
10 00 20 00 ==> four bytes data (unique identifier)
11 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ===> RC4 key
FF 04 00 02 00 00 00 04 FF 08 00 00 4B 63 3F 1B ===> configuration
00 00 00 00 FF 02 00 01 BB 01 FF 04 00 04 00 00
00 00 FF 04 00 03 3C 00 00 00 FF 04 00 05 00 00
00 00 FF 04 00 08 01 00 00 00 FF 04 00 06 00 00
00 00 FF 00 00 09 00 FF 00 00 0A 00 FF 00 00 0B
00 FF 00 00 0C 00 FF 00 00 0D 00 FF 00 00 0E 00
FF 04 00 07 00 00 00 00 FD
--End configuration data--
The malware encrypts a payload from the remote operator using the following hard-coded RC4 key:
--Begin hard-coded RC4 key--
53 87 F2 11 30 3D B5 52 AD C8 28 09 E0 52 60 D0 6C C5 68 E2 70 77 3C 8F 12 C0 7B 13 D7 B3 9F 7C
--End hard-coded RC4 key--
The encrypted payload is installed into the following registry key:
--Begin registry key--
hKey = HKEY_LOCAL_MACHINE
Subkey = "SYSTEM\CurrentControlSet\Services\Security" ValueName = "Data0"
ValueData = "Encrypted payload"
--End registry key--
The malware uses the following command to open the Windows Firewall port on the victim’s machine to allow incoming connections:
--Begin firewall modification--
"netsh firewall add portopening TCP 443 "Windows Firewall Remote Management""
--End firewall modification--
The malware binds and listens on port 443 for incoming connections from a remote operator. No outbound connection was observed. Static analysis indicates that the malware is capable of providing remote command and control (C2) capabilities, including the ability to exfiltrate data, install and run secondary payloads, and provide proxy services on a compromised system. The malware utilizes the RC4 encryption algorithm to encrypt and decrypt a portion of its communications data to and from the remote operator.
Listed below are the types of data exfiltrated by the malware:
- network adapter information
- computer name
- username
- systems Internet Protocol (IP) address
- hard-coded value (00 00 00 04h)
- current directory of the malware
- %Current directory%\malware.exe
- hard-coded value (01h)
- hard-coded value "PVS"
- the victim's operating system information
- installed drives information
- the current system time
Displayed below are additional functions the malware performs based on specified commands from the remote operator:
-Retrieve information drives installed
-Search for files
-Execute processes
-Terminate processes
-Delete files
-Execute commands
-Download and upload files
-Read files
-Write files
-Compress and uncompress files
-Change the listening port for Remote Desktop via registry modification
a9bc09a17d55fc790568ac864e3885434a43c33834551e027adb1896a463aafc
Tags
trojan
Details
Name | 8efaabb7b1700686efedadb7949eba49 |
---|---|
Size | 105984 bytes |
Type | PE32+ executable (DLL) (GUI) x86-64, for MS Windows |
MD5 | 8efaabb7b1700686efedadb7949eba49 |
SHA1 | 7b17d63694eee51010bcad143bc72e355e17cb50 |
SHA256 | a9bc09a17d55fc790568ac864e3885434a43c33834551e027adb1896a463aafc |
SHA512 | fce7a868b531f55b3f483dd66b3c029328ea18bf7586b00172e3c6735023631fa9091f4ac5d4d2f32da95045c18af7f433bbae1e989d68ae710beb676008512b |
ssdeep | 3072:jpaydDE0X8ShTP3SkwsX7Uo+fcqVFn+v4hbHxW:j0yx8eTP3SNC7UbUqVLx |
Entropy | 6.150963 |
Antivirus
Ahnlab | Malware/Win64.Generic |
---|---|
BitDefender | Trojan.GenericKD.30902108 |
Cyren | W64/Trojan.PRVF-4031 |
ESET | Win64/NukeSped.AK trojan |
Emsisoft | Trojan.GenericKD.30902108 (B) |
Ikarus | Trojan.Win64.Nukesped |
K7 | Trojan ( 0052a98d1 ) |
McAfee | Generic Trojan.aa |
Quick Heal | Trojan.IGENERIC |
Symantec | Trojan.Gen.2 |
Yara Rules
No matches found.
ssdeep Matches
No matches found.
PE Metadata
Compile Date | 2015-01-07 21:49:56-05:00 |
---|---|
Import Hash | f124895b94c3b1ec5baf7f21dc62122a |
Company Name | Microsoft Corporation |
File Description | Microsoft Neutral Natural Language Server Data and Code |
Internal Name | NlsLexicons0002 |
Legal Copyright | © Microsoft Corporation. All rights reserved. |
Original Filename | NlsLexicons0002.dll |
Product Name | Microsoft® Windows® Operating System |
Product Version | 6.1.7600.16385 |
PE Sections
MD5 | Name | Raw Size | Entropy |
---|---|---|---|
7db95ed8565bbdbfc5ed4c5e80c68a4f | header | 1024 | 2.598472 |
387bb23a8901baa300e42ce92310530e | .text | 71680 | 6.521050 |
f0411cd79ef1b71082f0817fe17fe1e6 | .rdata | 18432 | 4.690004 |
25afe34ab1b36cc1ee118c9165f8619c | .data | 7680 | 3.582928 |
1bb7ba760f7f7cba0addd4a273b464f6 | .pdata | 4096 | 4.606565 |
922af695fe14a7f70f8e068dcadc0584 | .rsrc | 1536 | 4.074927 |
729c12997f9639810666bb171ea9241d | .reloc | 1536 | 2.990709 |
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 468 | (384) |
rundll32.exe | 2204 | (1172) |
Description
This application is a malicious 64-bit Windows Dynamic Link Library (DLL), designed to run as a Windows service under Windows "svchost.exe." When executed, it searches and attempts to load and RC4-decrypt a payload from the following registry into memory:
--Begin registry key--
hKey = HKEY_LOCAL_MACHINE
Subkey = "SYSTEM\CurrentControlSet\Services\Security" ValueName = "Data0"
hKey = HKEY_LOCAL_MACHINE
Subkey = "SYSTEM\CurrentControlSet\Services\Security" ValueName = "Data2"
--End registry key--
The binary that installs the encrypted payload in the registry was not available for analysis.
75.99.63.27
Ports
- 443 TCP
Whois
Domain Name: optonline.net
Registry Domain ID: 4531660_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2016-06-08T16:38:21Z
Creation Date: 1996-10-07T04:00:00Z
Registrar Registration Expiration Date: 2018-10-06T04:00:00Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
Registrant Organization: Cablevision Systems Corporation
Registrant State/Province: New York
Registrant Country: US
Name Server: AUTHNS1.CV.NET
Name Server: AUTHNS1.CVNET.COM
DNSSEC: signedDelegation
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2018-05-22T21:00:00Z <<<
Relationships
75.99.63.27 | Contained_Within | ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629 |
d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee
Details
Name | Injection_API_executable_e |
---|---|
Size | 89088 bytes |
Type | 64-bit XCOFF executable or object module |
MD5 | b3efec620885e6cf5b60f72e66d908a9 |
SHA1 | 274b0bccb1bfc2731d86782de7babdeece379cf4 |
SHA256 | d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee |
SHA512 | a36dab1a1bc194b8acc220b23a6e36438d43fc7ac06840daa3d010fddcd9c3168a6bf314ee13b58163967ab97a91224bfc6ba482466a9515de537d5d1fa6c5f9 |
ssdeep | 1536:CnM87WOrh1EEshNunXJzZst56iYTKg+T8v6paBLc0s7G8Y+s0nrTqG0s0nrTqB:CpW2h1mhpaBqTrverE |
Entropy | 5.052439 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 496 | (384) |
cmd.exe | 2976 | (2944) |
rundll32.exe | 2456 | (2976) |
AcroRd32.exe | 2916 | (2456) |
Relationships
d465637518... | Related_To | e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8 |
Description
This file is an Advanced Interactive Executive (AIX) executable intended for a proprietary UNIX operating system developed by IBM. This application injects a library into a currently running process. Figure 1 is a screenshot containing strings of interest. The strings indicate the application is a command-line utility that enables an operator to easily conduct code injection on an IBM AIX platform. Analysis indicates this application logs its usage to a log file (Figure 2).
Screenshots
Figure 1 - Screenshot of the strings of interest
Figure 2 - Application logging its usage to a log file.
3a5ba44f140821849de2d82d5a137c3bb5a736130dddb86b296d94e6b421594c
Details
Name | Lost_File1_so_file |
---|---|
Size | 114688 bytes |
Type | 64-bit XCOFF executable or object module |
MD5 | d790997dd950bb39229dc5bd3c2047ff |
SHA1 | 7e6407c28c55475aa81853fac984267058627877 |
SHA256 | 3a5ba44f140821849de2d82d5a137c3bb5a736130dddb86b296d94e6b421594c |
SHA512 | afdeec93ecb0f97cdf712e80597c3b8ec1e9cad58e1673f2f3ad7f096d49450759b1621dc533b7cdeb62ee5970233bfa820b72cc4b33b919afd49d84823feae9 |
ssdeep | 1536:lJhosJHev1QFf+Z/2kREPItM9arn4nwF8uHit2Ofut:jhZJtf+Z/tJtMErn4/k62Iut |
Entropy | 4.803161 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 496 | (384) |
cmd.exe | 2136 | (3040) |
rundll32.exe | 2728 | (2136) |
AcroRd32.exe | 2900 | (2728) |
Description
This file is an AIX executable, intended for a proprietary UNIX operating system developed by IBM. This file is a library application designed to provide export functions. These functions allow an application to perform transactions on financial systems using the ISO8583 standard. A list of the ISO8583 functions is displayed in Figure 3 and Figure 4.
Screenshots
Figure 3 - List of ISO8583 functions
Figure 4 - ISO8583 functions continued
e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8
Details
Name | Injection_API_log_generating_script |
---|---|
Size | 2337 bytes |
Type | ASCII text |
MD5 | 844eec0ff86c10f5f9b41648b066563b |
SHA1 | 5d0fd2c5f58dcbc51e210894e8698bc14ccd30e2 |
SHA256 | e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8 |
SHA512 | 199dee05b602039e480f62963cb0ec3b96393e37bb78ff1475e6dfc5857e484924a476dbe73f02de96670ff488eb26f53ca9c600dd44390cf767a4aa510869a4 |
ssdeep | 48:H5rkj2hoPsGPWEA9oEro6mzsmPlaaCc8gN4ickx+nQZmZ7GA5hJLu:H5S0GPPA9hro6RClpCcxN4iDAmmZNhJS |
Entropy | 5.251062 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 496 | (384) |
cmd.exe | 2940 | (2880) |
rundll32.exe | 2584 | (2940) |
AcroRd32.exe | 3004 | (2584) |
Relationships
e03dc5f144... | Related_To | d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee |
Description
The file appears to be a log file generated by the usage of the application Inject API executable_e (b3efec620885e6cf5b60f72e66d908a9). The data contained in the log file is displayed in Figure 5, 6, and 7.
Screenshots
Figure 5 - Data contained in the log file.
Figure 6 - Data contained in the log file.
Figure 7 - Data contained in the log file.
f3e521996c85c0cdb2bfb3a0fd91eb03e25ba6feef2ba3a1da844f1b17278dd2
Details
Name | inject_api |
---|---|
Size | 19328 bytes |
Type | 64-bit XCOFF executable or object module |
MD5 | 58bb2236e5aee39760d3e4fc6ee94a79 |
SHA1 | a74dd2f9723dfb74d0d7b15294622b6ccc0b9562 |
SHA256 | f3e521996c85c0cdb2bfb3a0fd91eb03e25ba6feef2ba3a1da844f1b17278dd2 |
SHA512 | 9b67496127d26b47aa8857b1bcbcc43848c09bdf9369f1008a17257e099fbd23e1896d3abf98cab228e6538d3da741c96d6072cfffd7b9614df795b05de8cca0 |
ssdeep | 192:EPraBawFpGxj50/fNB426vRyMrwxOl61YIoBopje4T1jJWA3LZNE6X5PxhKaOdA3:djpGwVB426vRdrEVpt1jFlAAaQF |
Entropy | 4.345227 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 496 | (384) |
cmd.exe | 2932 | (2888) |
rundll32.exe | 2564 | (2932) |
AcroRd32.exe | 2836 | (2564) |
Description
This file is an AIX executable, intended for a proprietary UNIX operating system developed by IBM. Figure 8 displays strings of interest. The strings contained within the file indicate it is a command-line utility. The file is designed to update a proprietary data structure on a UNIX system known as "PVPA." The code structure in Figure 9, extracted from this application, attempts to perform a raw read of this data structure from memory.
Screenshots
Figure 8 - Screenshot of the strings of interest
Figure 9 - The UNIX AIX executable attempting to perform a read on the data.
ca9ab48d293cc84092e8db8f0ca99cb155b30c61d32a1da7cd3687de454fe86c
Details
Name | 2.so |
---|---|
Size | 110592 bytes |
Type | 64-bit XCOFF executable or object module |
MD5 | b66be2f7c046205b01453951c161e6cc |
SHA1 | ec5784548ffb33055d224c184ab2393f47566c7a |
SHA256 | ca9ab48d293cc84092e8db8f0ca99cb155b30c61d32a1da7cd3687de454fe86c |
SHA512 | 6890dcce36a87b4bb2d71e177f10ba27f517d1a53ab02500296f9b3aac0218107ced483d70d757a54a5f7489106efa1c1830ef12c93a7f6f240f112c3e90efb5 |
ssdeep | 3072:ZGLUeY4Q05eZTe/+3YZbAF/svvtBb0tTy:gLFMAG3YZMF/eBbQTy |
Entropy | 4.752979 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 468 | (384) |
cmd.exe | 2692 | (2276) |
rundll32.exe | 2864 | (2692) |
AcroRd32.exe | 2112 | (2864) |
Description
This file is an AIX executable, intended for a proprietary UNIX operating system developed by IBM. The application provides several exported methods permitting the interaction with financial systems that utilize the ISO8583 standard. A list of the ISO8583 functions is displayed in Figure 10 and Figure 11. This file is not considered malicious, but may have been used by actors for malicious purposes.
Screenshots
Figure 10 - List of ISO8583 functions
Figure 11 - ISO8583 functions continued
10ac312c8dd02e417dd24d53c99525c29d74dcbc84730351ad7a4e0a4b1a0eba
Details
Name | Lost_File.so |
---|---|
Size | 108896 bytes |
Type | 64-bit XCOFF executable or object module |
MD5 | 46b318bbb72ee68c9d9183d78e79fb5a |
SHA1 | 5375ad3746ce42a6f262f55c4f1f0d273fb69c54 |
SHA256 | 10ac312c8dd02e417dd24d53c99525c29d74dcbc84730351ad7a4e0a4b1a0eba |
SHA512 | c91c8ad860d0e03310d8a0c801495e97635a5f8d5e96282dcb343870443ea0519011d745a323d48a941a23b8226a21809d41cd19c8319e99a6c548dd68649ec2 |
ssdeep | 3072:vGLUeY4Q05eZTe/+3YZbAF/7dvtV06eyk:+LFMAG3YZMF/fV06eyk |
Entropy | 4.816181 |
Antivirus
No matches found.
Yara Rules
No matches found.
ssdeep Matches
No matches found.
Process List
Process | PID | PPID |
---|---|---|
lsass.exe | 496 | (384) |
cmd.exe | 2960 | (2908) |
rundll32.exe | 1864 | (2960) |
AcroRd32.exe | 2868 | (1864) |
Description
This file is a UNIX Common Object File Format (COFF) executable, a format for executable, object code, and shared libraries used on UNIX systems. The executable provides several exported methods that enable interactions with financial systems utilizing the ISO8583 standard. This file is not considered malicious but may have been used by actors for malicious purposes.
Relationship Summary
ab88f12f0a... | Contains | 75.99.63.27 |
75.99.63.27 | Contained_Within | ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629 |
d465637518... | Related_To | e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8 |
e03dc5f144... | Related_To | d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee |
Recommendations
NCCIC would like to remind users and administrators to consider using the following best practices to strengthen the security posture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.
- Maintain up-to-date antivirus signatures and engines.
- Keep operating system patches up-to-date.
- Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
- Restrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
- Enforce a strong password policy and implement regular password changes.
- Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
- Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
- Disable unnecessary services on agency workstations and servers.
- Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its "true file type" (i.e., the extension matches the file header).
- Monitor users' web browsing habits; restrict access to sites with unfavorable content.
- Exercise caution when using removable media (e.g., USB thumbdrives, external drives, CDs, etc.).
- Scan all software downloaded from the Internet prior to executing.
- Maintain situational awareness of the latest threats and implement appropriate ACLs.
Additional information on malware incident prevention and handling can be found in NIST's Special Publication 800-83, Guide to Malware Incident Prevention & Handling for Desktops and Laptops.
Contact Information
- 1-888-282-0870
- NCCICCustomerService@us-cert.gov (UNCLASS)
- us-cert@dhs.sgov.gov (SIPRNET)
- us-cert@dhs.ic.gov (JWICS)
NCCIC continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.gov/forms/feedback/
Document FAQ
What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact NCCIC and provide information regarding the level of desired analysis.
Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the NCCIC at 1-888-282-0870 or soc@us-cert.gov.
Can I submit malware to NCCIC? Malware samples can be submitted via three methods:
- Web: https://malware.us-cert.gov
- E-Mail: submit@malware.us-cert.gov
- FTP: ftp.malware.us-cert.gov (anonymous)
NCCIC encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on US-CERT's homepage at www.us-cert.gov.
To learn more about how Herjavec Group can help you secure your environment, please connect with a security specialist.