This zipped email attachment was received a few days ago and block by antispam policy. It contained a very large ISO/EXE file similar to the diary published by Zavier [1] last week. Instead of using Remnux, I submitted this file to a sandbox. This is a summary of the result of the analysis. This malware communicate with the C2 site bitrat9300.duckdns[.]org over TCP/9300. This port is also used by Elasticsearch to connect to remote clusters. Linux Command sudo mount -o loop AMD8J46DH_ETRANFER_RECEIPT.iso /mnt File Size at Various Stages -r-xr-xr-x. 1 guy guy 314572800 Jun 4 11:34 AMD8J46DH_ETRANFER_RECEIPT.exe I noticed the EXE contained the following SmartAssembly URL. "SmartAssembly is an obfuscator that helps protect your application against reverse-engineering or modification, by making it difficult for a third-party to access your source code."[4] http://www.smartassembly[.]com/webservices/UploadReportLogin/ VirusTotal currently doesn't have any detection for this malware, currently, Microsoft Defender detect this file as: Trojan: MSIL/AgentTelsa.AFFA!MTB [5] Indicator of Compromise bitrat9300.duckdns[.]org (C2) Bitrat Config File BitRat {"Host": "bitrat9300.duckdns[.]org", "Port": "9300", "Tor Port": "0", "Install Dir": "0", "Install File": "0", "Communication Password": "e10adc3949ba59abbe56e057f20f883e", "Tor Process Name": "tor"} Setup Schedule Task C:\Windows\SysWOW64\schtasks.exe schtasks /create /sc minute /mo 1 /tn "Nafdnasia" /tr "'C:\Users\user\AppData\Roaming\namjs.exe'" /f [1] https://isc.sans.edu/forums/diary/A+Zip+Bomb+to+Bypass+Security+Controls+Sandboxes/28670 ----------- |
Guy 523 Posts ISC Handler Jun 4th 2022 |
Reply Subscribe |
Jun 4th 2022 4 weeks ago |
Sign Up for Free or Log In to start participating in the conversation!