Banking trojan that targets Korean banks, change the hosts file to the follwing:
drops another unknown exe (emedhtml.exe) file, it doesn't run it but read from it and decrypt the content.
i can't detect what is the decrypted content but i assume it is some kind of certification.
mk.exe VT 28/45 https://www.virustotal.com/en/file/9304 ... /analysis/
dropped exe (emedhtml.exe) VT 0/47 https://www.virustotal.com/en/file/0c89 ... /analysis/
.bat file VT 5/47 https://www.virustotal.com/en/file/ed62 ... 368787379/
In attached packed and unpacked sample as well as the dropped files + memory dump of the decrypted buffer.
Code: Select all
change the hosts file using a BATCH file.127.0.0.1 lOcalhOSt
125.194.227.6 BaNKiNG.NONGhYUp.cOM
125.194.227.6 WWW.BaNKiNG.NOnGhyUp.cOM
125.194.227.6 NoNGhYup.cOM
125.194.227.6 ibz.nonghyup.com
125.194.227.6 WWW.NoNghyUp.cOM
125.194.227.6 WOOriBANK.coM
125.194.227.6 WWW.WOoRiBAnK.cOM
125.194.227.6 piB.WOOriBaNk.cOM
125.194.227.6 sPD.WoORiBaNK.cOM
125.194.227.6 U.WOORiBanK.cOM
125.194.227.6 pot.wooribank.com
125.194.227.6 WOOriBANK.coM
125.194.227.6 OBaNK.KBStaR.cOM
125.194.227.6 WWW.KBStaR.cOM
125.194.227.6 KBStaR.cOM
125.194.227.6 ObiZ.KbStaR.cOm
125.194.227.6 WWW.ShiNhaN.coM
125.194.227.6 BaNKiNg.SHiNHAN.cOM
125.194.227.6 bIZBanK.ShinhaN.cOm
125.194.227.6 easy.Shinhan.CoM
125.194.227.6 OpEn.Shinhan.CoM
125.194.227.6 WWW.KeB.CO.Kr
125.194.227.6 baNK.KEb.cO.kR
125.194.227.6 fx.KeB.CO.Kr
125.194.227.6 WWW.StaNdarDChartErED.cO.KR
125.194.227.6 Www.IbK.co.kR
125.194.227.6 MyBanK.ibK.CO.Kr
125.194.227.6 KIUP.ibK.CO.kR
125.194.227.6 open.ibK.CO.kR
125.194.227.6 haNABank.cOM
125.194.227.6 WwW.hanaBANk.coM
125.194.227.6 corp.hanaBANk.coM
125.194.227.6 www.keb.co.kr
125.194.227.6 bank.keb.co.kr
125.194.227.6 fx.keb.co.kr
125.194.227.6 ebank.keb.co.kr
125.194.227.6 online.keb.co.kr
drops another unknown exe (emedhtml.exe) file, it doesn't run it but read from it and decrypt the content.
i can't detect what is the decrypted content but i assume it is some kind of certification.
mk.exe VT 28/45 https://www.virustotal.com/en/file/9304 ... /analysis/
dropped exe (emedhtml.exe) VT 0/47 https://www.virustotal.com/en/file/0c89 ... /analysis/
.bat file VT 5/47 https://www.virustotal.com/en/file/ed62 ... 368787379/
In attached packed and unpacked sample as well as the dropped files + memory dump of the decrypted buffer.
Attachments
pass: infected
(126.03 KiB) Downloaded 64 times
(126.03 KiB) Downloaded 64 times