Author Topic: New Malware Crypt Method  (Read 2948 times)

0 Members and 1 Guest are viewing this topic.

REDACTED

  • Guest
New Malware Crypt Method
« on: August 16, 2016, 02:20:54 PM »
New malware released, I analysed

File: https://www.sendspace.com/file/5nsyrx

This application uses NSIS's System Plugin to load the contents from file "leuopcoh" (Seen from 7Zip). There are other random files there with junk contents. File "leuopcoh" is shellcode that is used with Windows function "CallWindowProc" with parameter to encrypted data file "eycwmoss.tjhe", used to load the malware.

Calls to NSIS's System Plugin can be clearly seen from the NSIS script (3 calls: VirtualAlloc, FileReadW, CallWindowProcW)

From the NSIS Script:
Code: [Select]
System::Call 'kernel32::VirtualAlloc(i 0, i 9226, i 0x3000, i 0x40) p .r0'
System::Call 'kernel32::ReadFile(i r1, p r0, i 9226, t.,)'
System::Call 'user32::CallWindowProcW(p r0, t 'C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\eycwmoss.tjhe', i 0, i 0, i 0) i .r1)'

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user
Re: New Malware Crypt Method
« Reply #1 on: August 16, 2016, 02:55:48 PM »
Quote
New malware released
Upload and scan file at www.virustotal.com  post link to scan result here

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89029
  • No support PMs thanks
Re: New Malware Crypt Method
« Reply #2 on: August 16, 2016, 03:20:49 PM »
Please modify/break the link to possible malware (so it isn't active) to avoid accidental exposure.

hXXps://www.sendspace.com/file/5nsyrx
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD/ avast! free 24.3.6108 (build 24.3.8975.762) UI 1.0.801/ Firefox, uBlock Origin, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37527
  • Not a avast user

Offline jefferson sant

  • Starting Graphoman
  • *
  • Posts: 6677
  • volunteer
Re: New Malware Crypt Method
« Reply #4 on: August 18, 2016, 01:31:42 AM »
Hello.

If the file was downloaded directly from the link detection is Win32:Evo-gen [Susp] .The same is already on the PC and run when detecting changes to FilerepMalware.Can be seen attached.
« Last Edit: August 18, 2016, 01:36:03 AM by jefferson sant »

Offline jefferson sant

  • Starting Graphoman
  • *
  • Posts: 6677
  • volunteer
Re: New Malware Crypt Method
« Reply #5 on: August 29, 2016, 12:37:12 AM »
I resubmit the file and detection has been added accordingly.
The detection was teetering once was detected another time not because of the behavior.In scanning the file is detected as Win32:Trojan-gen and the files contained within crypt were created
signatures.Attached