Windows MetaStealer Malware

April 11, 2022

TRAFFIC GENERATED AFTER ENALBING EXCEL MACRO: – port 443 – https://github.com/michel15P/1/raw/main/notice.zip – port 443 – https://raw.githubusercontent.com/michel15P/1/main/notice.zip TRAFFIC GENERATED BY NOTICE.EXE – port 80 – transfer.sh – GET /get/qT523D/Wlniornez_Dablvtrq.bmp – port 443 – https://transfer.sh/get/qT523D/Wlniornez_Dablvtrq.bmp – 193.106.191.162 port 1775 – 193.106.191.162:1775 – GET /avast_update – 193.106.191.162 port 1775 – 193.106.191.162:1775 – GET /api/client/new – 193.106.191.162 port 1775 – 193.106.191.162:1775 – POST /tasks/get_worker ALERTS ON POST-INFECTION TRAFFIC TO 193.106.191.162 OVER TCP PORT 1775: – ETPRO MALWARE Win32/MetaStealer Related Activity (GET) (sid:2851362) – ETPRO MALWARE Win32/MetaStealer Related Activity (POST) (sid:2851363) ASSOCIATED MALWARE: – SHA256 hash: 981247f5f23421e9ed736dd462801919fea2b60594a6ca0b6400ded463723a5e – File size: 88,069 bytes – File name: transfer_info2460.xls – File description: Email attachment, Excel file with macro for malware – SHA256 hash: 81e77fb911c38ae18c268178492224fab7855dd6f78728ffedfff6b62d1279dc – File size: 2,828 bytes – File name: open.vbs – File location: same directory as the Excel file – File description: VBS file used to create persistent EXE – SHA256 hash: 8cfa23b5f47ee072d894ee98b1522e3b8acc84a6e9654b71f50536e74a3579a5 – File size: 417,512 bytes – File location: https://raw.githubusercontent.com/michel15P/1/main/notice.zip – File description: data binary retrieved by open.vbs and used to persistent EXE (below) – SHA256 hash: f644bef519fc0243633d13f18c97c96d76b95b6f2cbad2a2507fb8177b7e4d1d – File size: 367,001,600 bytes – File location: C:Users[username]AppDataLocalTempnotice.exe – File location: C:Users[username]AppDataRoamingqwveqwveqw.exe – File description: Windows EXE persistent on the infected Windows host – Note: This binary is appended with more than 366 MB of zero-byte filler – Note: Persistent through “Shell” value at HKCUSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon – SHA256 hash: 7641ae596b53c5de724101bd6df35c999c9616d93503bce0ffd30b1c0d041e3b – File size: 143,400 bytes – File description: Persistent malware notice.exe with most of the zero-byte filler removed – SHA256 hash: fba945b78715297f922b585445c74a4d7663ea2436b8c32bcb0f4e24324d3b8b – File size: 716,288 bytes – File location: https://transfer.sh/get/qT523D/Wlniornez_Dablvtrq.bmp – File description: Retrieved by notice.exe, this binary is a Windows DLL file in reverse byte order – SHA256 hash: bf3b78329eccd049e04e248dd82417ce9a2bcaca021cda858affd04e513abe87 – File size: 716,288 bytes – File description: Windows DLL file created by reserving the above binary – File type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows – Run method: run by notice.exe – SHA256 hash: cb6254808d1685977499a75ed2c0f18b44d15720c480fb407035f3804016ed89 – File size: 2,182,488 bytes – File location: http://193.106.191.162:1775/avast_update – File description: base64 text representing a Windows DLL file – SHA256 hash: 71e54b829631b93adc102824a4d3f99c804581ead8058b684df25f1c9039b738 – File size: 1,636,864 bytes – File description: Windows DLL file converted from avast_update text – File type: PE32 executable (DLL) (console) Intel 80386, for MS Windows – Run method: unknown, run by notice.exe or the above DLL run by notice.exe
Subscribe