Windows MetaStealer Malware

April 11, 2022

TRAFFIC GENERATED AFTER ENALBING EXCEL MACRO: - port 443 - https://github.com/michel15P/1/raw/main/notice.zip - port 443 - https://raw.githubusercontent.com/michel15P/1/main/notice.zip TRAFFIC GENERATED BY NOTICE.EXE - port 80 - transfer.sh - GET /get/qT523D/Wlniornez_Dablvtrq.bmp - port 443 - https://transfer.sh/get/qT523D/Wlniornez_Dablvtrq.bmp - 193.106.191.162 port 1775 - 193.106.191.162:1775 - GET /avast_update - 193.106.191.162 port 1775 - 193.106.191.162:1775 - GET /api/client/new - 193.106.191.162 port 1775 - 193.106.191.162:1775 - POST /tasks/get_worker ALERTS ON POST-INFECTION TRAFFIC TO 193.106.191.162 OVER TCP PORT 1775: - ETPRO MALWARE Win32/MetaStealer Related Activity (GET) (sid:2851362) - ETPRO MALWARE Win32/MetaStealer Related Activity (POST) (sid:2851363) ASSOCIATED MALWARE: - SHA256 hash: 981247f5f23421e9ed736dd462801919fea2b60594a6ca0b6400ded463723a5e - File size: 88,069 bytes - File name: transfer_info2460.xls - File description: Email attachment, Excel file with macro for malware - SHA256 hash: 81e77fb911c38ae18c268178492224fab7855dd6f78728ffedfff6b62d1279dc - File size: 2,828 bytes - File name: open.vbs - File location: same directory as the Excel file - File description: VBS file used to create persistent EXE - SHA256 hash: 8cfa23b5f47ee072d894ee98b1522e3b8acc84a6e9654b71f50536e74a3579a5 - File size: 417,512 bytes - File location: https://raw.githubusercontent.com/michel15P/1/main/notice.zip - File description: data binary retrieved by open.vbs and used to persistent EXE (below) - SHA256 hash: f644bef519fc0243633d13f18c97c96d76b95b6f2cbad2a2507fb8177b7e4d1d - File size: 367,001,600 bytes - File location: C:Users[username]AppDataLocalTempnotice.exe - File location: C:Users[username]AppDataRoamingqwveqwveqw.exe - File description: Windows EXE persistent on the infected Windows host - Note: This binary is appended with more than 366 MB of zero-byte filler - Note: Persistent through "Shell" value at HKCUSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon - SHA256 hash: 7641ae596b53c5de724101bd6df35c999c9616d93503bce0ffd30b1c0d041e3b - File size: 143,400 bytes - File description: Persistent malware notice.exe with most of the zero-byte filler removed - SHA256 hash: fba945b78715297f922b585445c74a4d7663ea2436b8c32bcb0f4e24324d3b8b - File size: 716,288 bytes - File location: https://transfer.sh/get/qT523D/Wlniornez_Dablvtrq.bmp - File description: Retrieved by notice.exe, this binary is a Windows DLL file in reverse byte order - SHA256 hash: bf3b78329eccd049e04e248dd82417ce9a2bcaca021cda858affd04e513abe87 - File size: 716,288 bytes - File description: Windows DLL file created by reserving the above binary - File type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows - Run method: run by notice.exe - SHA256 hash: cb6254808d1685977499a75ed2c0f18b44d15720c480fb407035f3804016ed89 - File size: 2,182,488 bytes - File location: http://193.106.191.162:1775/avast_update - File description: base64 text representing a Windows DLL file - SHA256 hash: 71e54b829631b93adc102824a4d3f99c804581ead8058b684df25f1c9039b738 - File size: 1,636,864 bytes - File description: Windows DLL file converted from avast_update text - File type: PE32 executable (DLL) (console) Intel 80386, for MS Windows - Run method: unknown, run by notice.exe or the above DLL run by notice.exe