Dumped of b9bc3f1b2aace824482c10ffa422f78b:
8/57
Network traffic:
Code: Select all/news/userlogin.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: https://www1.google.com
User-Agent: Mozilla/4.0 (compatible; MSIE 2.1; Windows NT 5.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0)
Host: eboduftazce-ru.com:443
Content-Length: 114
Cache-Control: no-cache
• dns: 1 ›› ip:
188.42.254.65 - adress: EBODUFTAZCE-RU.COM
DGA activ domain:
• dns: 1 ›› ip: 188.42.254.65 - adress: AEHTCDB.INFO
Another file who connect to the same host in attachement.
VT:
34/57 - unpack:
7/57
Some strings from the xor proc:
Code: Select allIntelPowerAgent32
rundll32.exe shell32.dll, ShellExec_RunDLL
software\\microsoft\\windows\\currentversion\\run
software\\microsoft\\windows nt\\currentversion\\winlogon
kernel
.exe
.dll
GetProcessUserModeExceptionPolicy
IsWow64Process
%s:Zone.Identifier
%OS%_%NUMBER_OF_PROCESSORS%
%02x
pos.exe
bank.exe
tellerplus|bancline|fidelity|micrsolv|bankman|vanity|episys|jackhenry|cruisenet|gplusmain|silverlake|v48d0250s1
bitcoin\\wallet.dat
litecoin\\wallet.dat
C:\\Omikron\\MCSign
ELBA5\ELBA_data
HBPData\\hbp.profile
iexplore.exe|opera.exe|firefox.exe|chrome.exe|maxthon.exe|java.exe|javaw.exe|plugin-container.exe|acrobat.exe|acrod32.exe
C:\\Documents and Settings\\Administrateur\\Application Data\\2cd56582\\keylog.txt
Malware persistence via HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run:
rundll32.exe shell32.dll, ShellExec_RunDLL C:\Documents and Settings\All Users\Application Data\bhf28d4426.exe
Basically for the infection set-up: Drop a copy, corrupt first location of the file create persistences and CreateRemoteThread.
He use windows registry to get good explorer (software\microsoft\windows nt\currentversion\winlogon\shell) to avoid injecting total commander or app like that i believe
You can replace the value to make it inject on empty.exe or whatever to facilitate debug.
Injection fail (patch at 40156A to derivate, 401677 for 9F4771249DC26A0C49E647D13B6DE242):
Keylogger:
Code: Select allrule Shifu
{
meta:
author = "xylitol@temari.fr"
description = "Search for hex and strings pattern on Win32/Spy.Shiz.NCP (Shifu)"
// May only the challenge guide you...
strings:
$a1 = {C7 06 3C 00 00 00 C7 46 0C ?? ?? ?? ?? 89 5E 10 89 46 14 C7 46 04 40 00 00 00 EB 1C}
$a2 = {85 C0 75 3A 68 ?? ?? ?? ?? 53 FF 15 ?? ?? ?? ?? 85 C0}
$a3 = {8A 1C 0E 32 5D 0C 88 19 41 4A 75 F4}
$b1 = "cmd.exe" wide ascii
$b2 = "runas" wide ascii
$b3 = "exe"
condition:
all of ($a*) and 2 of ($b*)
}
Shifu search also for bitcoin and litecoin wallets, that not mentioned on IBM report.
edit: VirusBulletin guys released a cool paper:
https://www.virusbtn.com/virusbulletin/ ... 1511-Shifu
edit 2: Vidya:
https://www.youtube.com/watch?v=eenMSH69psQ