/images/avatar.png

d01a

ALPHV ransomware

Introduction

ALPHV/Blackcat is a ransomware family that uses Ransomware-as-a-service (RaaS) business model. The ransomware is written in Rust Programming language. It is highly configurable using embedded configurations or provided as command line arguments. The malware family has Windows, Linux and ESXi versions. The malware uses AES or ChaCha20 to encrypt the files and delete the volume shadow copies to decrease the possibility of any data survival. It also kills predefined set of services and Processes related to Anti-malware products, Virtualization software and other business-related and backup software. The following graph represents the attack flow of the ransomware.

Redline stealer

Introduction

Redline stealer is one of the most popular info stealers out there. The malware is available for sale on underground forums for a different subscription options. The malware has a large set of stealing modules. It harvests:

  • Victim information (such as hostname, hardware specs, location, and live screenshot)
  • Browser data (such as saved passwords, cookies, and autofill fields)
  • Crypto wallets
  • Telegram data
  • Discord tokens
  • Specific files from the victim machine
  • FTP server credentials
  • Game launcher data (Steam login files)
  • VPN credentials

Also, it has a component that can be used as a loader to execute other malware families or download a newer version of the stealer.

Understanding Syscalls: Direct, Indirect, and Cobalt Strike Implementation

Syscalls? Why?

  • To Bypass user-mood hooks. why?
    • For Hiding a code inside a legitimate process (Process Injection)
    • Avoiding EDR alerts!

User-mood Hooks

Hooking user-mode functions by placing a jump to another code section. EDRs use hooks to check the function parameters. For example, if you are trying to change the memory protections of some data to add executable protections. This is a very suspicious activity so EDRs will be alert to that. Most Hooks are on the lowest level of the user-mode interface in ntdll.dll which are the system calls.

Pikabot deep analysis

Introduction

Pikabot is a new malware first seen in early 2023. It has two components: Loader and core module. It is still in its initial stages, expected to see increasing activity in the future. Some researchers believe that it is linked to TA570 because of the similarity of delivering method between it and Qbot trojan. And the absence of Qbot activity in the period of pikabot activity. The Loader usage is to perform a lot of Anti-debug, Anti-VM and Anti-emulation checks to make it harder for automated analysis and inject the core module. The strings are obfuscated using the stack and simple Bitwise operation. The constant integers are obfuscated using structures and loops to get the right offset. The core module has a lot of functionality that gives the attacker full control of the victim machine.

Aurora Stealer Builder

Introduction

in the previous article, I discussed what’s inside Aurora Stealer. After the release, @Gi7w0rm provided me samples of some versions of Aurora Stealer builder, a new version that was created recently and another one that was created in 2022. The newer version has some improvements in the builder and new features we will discuss in this article. Before we start this article, it is important to note that the Builder also contains and creates the Web panel to control the bots. This means the binaries we are looking at are actually a hybrid between a builder and a panel.

Aurora Stealer

Introduction

Aurora Stealer is an information stealer Written in GO. It is a commercial stealer that costs around 250$ per month. The malware can steal Browser password and saved cookies, crypto information (Desktop and Web), Telegram, Steam and Specific files from the victim machine and can take a screenshot from it.

/aurora-stealer/Aurora%20Stealer%203ac5d7639dee4d95b3cfd546053de596/Untitled.png

Basic information

The icon of the executable gives us a hit about how this is spreading. It has Photoshop icon, most probably it was spreading using Malvertising.

OriginLogger Loader

Conclusion

Origin Logger is a variant of Agent tesla, it is build on top of it and uses all of its capabilities. The malware is spreading using spam emails with a malicious attachments. The malware exfiltrate user accounts and passwords and other information from the infected machine.

Infection through Email

the infection is started with spam email attached by .iso File

/originlogger/img/email.png

Raccoon Stealer

Conclusion

Raccoon Stealer V2 (or RecordBreaker) Is a stealer that provided as a service with about 200$/m. It is a new version of Raccoon stealer that appeared in 2019 and died for a while then it returns with this new Stealer which known as RecordBreaker.
It Comes with a lot of capabilities, It can grab a lot of sensitive information like :

  1. Steal Victim System information
  2. Steal Victim Username and passwords stored in the browser
  3. Steal Victim Browser’s Autofill Information
  4. Steal Credit Card information
  5. Steal Crypto wallets Information
  6. Steal Bitcoin Wallets
  7. Grab any file from the victim system
  8. Take Screenshots from the victim system
  9. Load next stage

Analysis

First Look

First we start with basic analysis, using Detect it easy we see that the file seems to be not packed. Exploring the strings tab, we see a lot of base64 encoded strings and two registry keys SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall and SOFTWARE\Microsoft\Cryptography