Trojan.Fareit IIV
Phishing Email lands |
The malicious attachment was extracted from the .eml file |
OfficeMalScanner was used to extract the malicious VB macro code |
We can see three modules |
The code creates a URL which seems to be pointing towards a .txt resource |
This is what the text file looks like which is also obfuscated but from the looks of it we can see that there seem to be a mix of VBS and .bat script code |
We can see another URL being created in parallel. We will come to know what it is as we proceed. |
We can see MSXML2.ServerXMLHTTP object being created which will be used to create GET request |
We can see that the response of the sever (the .txt file containing vbs and bat code) is stored in a variable as a string |
We can see that the macro is creating a vbs file |
The 11821.vbs file is also created in the temp folder |
Looking at the obfuscated vbs code indicates that MSXML2.ServerXMLHTTP object is being created which GETs the second stage binary s1.exe and saves it as 10.exe in the temp folder |
The bat file is also created in the tmp folder |
We can see that after creating the above two scripts in the temp folder the macro is executing the bat file using Shell() |
We can see the process hacker's process tree and can clearly see the cmd.exe, conhost.exe, cscript.exe and ping.exe as child processes. |
The above code is just throwing and error and is irrelevant |
Unfortunately I was not able to get my hands on the second stage binary as the resource is unavailable and cannot be found. Throws a 404.
The call back to the address 37.187.140.111 was detected as a C2 communication at the perimeter and the malware being downloaded is classified as Trojan.Fareit, which is a password stealer. A good amount of technical information for the second stage binary can be found at: https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Win32/Fareit#tab=2
Comments
Post a Comment