Skip to content

Latest commit

 

History

History
106 lines (65 loc) · 3.69 KB

malbuster.md

File metadata and controls

106 lines (65 loc) · 3.69 KB

You are tasked to analyse unknown malware samples detected by your SOC team.

Dissecting PE Headers

start the machine, i will use Flare VM based on windows

cd C:\Users\Administrator\Desktop\Samples
Get-ChildItem
Get-ChildItem | Get-FileHash -Algorithm MD5 | select Hash,Path

image

if you check first file with REMnux VM using file command

you can see it's PE32 executable, or Portable Executable 32-bit

now, search md5 hash of first file on virustotal

image

search md5 hash of second file on virustotal

image

check Details tab, you can see the dll it import

image

and original name of it

image

check malware signature of 3rd and 4th file on abuse.ch

image

image

open PE-Bear in Flare VM, find the message in DOS_STUB of malbuster_4

image

or you can use PE Tree in REMnux VM will return same answer

image

search md5 hash of 4th file on virustotal, check Details tab to see imported dll

image

capa malbuster_1 | findstr /I "anti"

image

capa malbuster_1 | findstr /I "log keystrokes"
capa malbuster_2 | findstr /I "log keystrokes"
capa malbuster_3 | findstr /I "log keystrokes"
capa malbuster_4 | findstr /I "log keystrokes"

you can find the answer in malbuster_3

image

capa malbuster_4 | findstr /I "DISCOVERY"

image

strings malbuster_1 | findstr /I "GodMode"
strings malbuster_2 | findstr /I "GodMode"
strings malbuster_3 | findstr /I "GodMode"
strings malbuster_4 | findstr /I "GodMode"

you can find the answer in malbuster_2

image

strings malbuster_1 | findstr /I "Mozilla/4.0"
strings malbuster_2 | findstr /I "Mozilla/4.0"
strings malbuster_3 | findstr /I "Mozilla/4.0"
strings malbuster_4 | findstr /I "Mozilla/4.0"

you can find the answer in malbuster_1

image

Answer:

image

image

image