welivesecurity.com/2019/10/17/ope…
To save somebody time, it’s 40 pages. Some interesting info in the thread below
Standard switch/case inside a loop workflow.
- read encrypted file from hardcoded or in-registry path
- decrypt(PBKDF2) with hardcoded pathword and salt stored at registry
HKLM\SOFTWARE\Intel\ MediaSDK\Dispatch\hw64-s1-1 => RootPath / APIModule / Stack
HKLM\SOFTWARE\Microsoft\ MSBuild\4.0 => MSBuildOverrideTasksPath / DefaultLibs / BinaryCache
than in-memory payload gets new C&C from dropbox’s image(standard steganography, last 2 bits from each pixels color)
*Search API function by hash
*GET, POST and PUT communication with C2 via HTTP
*send and receive data over a named pipe(say hello to P2P Command and Control)
*tunneling via 8080 port
Persistence:
standart registry \CurrentVersion\Run entry «Canon Gear» => C:\Program Files\Canon\NetworkScanGear\Canocpc.exe
C&C communication via HTTP(mimic installed browser)
To get installed browser implant using 2 technics:
User-Agent parsed from HTTP request
Binary contains many strings from different projects like Chromium. It’s try to bypass next-gen AI products :) Say hello to Cylance AI Module skylightcyber.com/2019/07/18/cyl…