Carding

Professional
Messages
2,871
Reaction score
2,331
Points
113
Having a look on another POS malware named by AV guys BlackPOS:
28-05-2013+03-12-04.png

03-04-2013+21-08-18.png


MD5: cbd268e260bf40c25f1bff8b85e04e01
The original exe is packed with UPX and have a size of (292 Kb)
After unpacking the exe size is 754 Kb and the Time/Date Stamp: 512A2914 (24-02-2013 - 14:52:04)
First seen in VirusTotal... right now

28-05-2013+13-41-12.png


This malware retrieve the path of %USERPROFILE%:
28-05-2013+00-11-38.png


At this step we can trick it like ProjectHook to display a leet GUI:
28-05-2013+00-48-51.png

Just take the jump:
28-05-2013+00-46-50.png


Now if we don't take it, it copy the actual file to %USERPROFILE% with the name svhst.exe
28-05-2013+00-19-28.png


execute the original exe with argument '/silentinstall'
28-05-2013+00-23-04.png


I've choose to NOP the line to continue without infecting my vm, and what's he do next ?
The same crap but this time with argument ''/firewall"
28-05-2013+00-28-01.png


Re-NOPed the line and... yeah, you guessed it, still WinExec with "Netsh firewall set opmode disable"
28-05-2013+00-32-21.png

Netsh = network shell, this command will disable the Windows firewall.

Then he delete the file dum.exe (???)
28-05-2013+00-33-18.png


He create after a registry entry: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
28-05-2013+01-04-24.png


RegSetValueExA with 'svchît' as name and %USERPROFILE%/svhst.exe as key.

RegCloseKey:
[URL="https://4.bp.blogspot.com/-9uC0A8mj-x0/UaPnsb5sXjI/AAAAAAAAh3w/sXF1RMUXXLQ/s1600/28-05-2013+01-09-26.png"]



Now he will load a exe file from ressource:

28-05-2013+01-56-56.png


And file 'dum.exe' is made (the exe file he tryed to delete earlier)
28-05-2013+01-26-21.png

Write it:
28-05-2013+01-33-48.png

And Close when everything is cool:
28-05-2013+01-35-19.png


SetFileAttributesA:
28-05-2013+01-40-49.png


Open it with SW_HIDE:
28-05-2013+01-43-30.png


But what is it new file ?
28-05-2013+01-44-50.png

Yo dawg i herd you like POS malware so we put a POS malware in yo POS malware so you can grab will u grab
MD5: 7f9cdc380eeed16eaab3e48d59f271aa

But if he ShellExecuteA mmon.exe, that mean it swiping time !
28-05-2013+13-54-38.jpg
[/URL]
28-05-2013+13-56-02.jpg


So, 'mmon.exe' generate us a file 'output.txt' with our track2. and this 'output.txt' is of course visible.

Meanwhile, BlackPos do a sleep of 400000 ms (6 minutes and 40 seconds) leaving the time for 'mmon.exe' to search track2:
28-05-2013+02-08-09.png


After this sleep, it take output.txt of mmon and try to Create it to see if the file already exist:
28-05-2013+02-53-38.png

Read the content:
28-05-2013+02-55-17.png

Close it:
28-05-2013+03-00-01.png

And create a new text file "03.05.25.txt":
28-05-2013+03-02-55.png


Then he add the content of output.txt inside "03.05.25.txt" and set the file hidden:
28-05-2013+03-18-22.png


Then he connect to FTP (what a good idea!)
28-05-2013+13-02-54.png
[/URL]

28-05-2013+03-21-39.png

.netai.net... maybe he grabbed not enough track2 to buy a decent hosting.

Compare if the domain is equal to localhost:
28-05-2013+13-05-34.png
[/URL]

28-05-2013+12-35-44.png


The he upload the TXT on reports folder and delete dum.exe and output.txt
28-05-2013+14-00-26.png

Then i've stopped here, since i'm at the end of the procedure he surely loop the process of scanning with mmon.

If you want to see what's look like the panel for this sample:
• dns: 1 ›› ip: 31.170.161.116 - adresse: KROKODIL.NETAI.NET
28-05-2013+12-37-21.png
[/URL]
28-05-2013+12-43-02.png


Panel of another sample (d9cc74f36ff173343c6c7e9b4db228cd):
• dns: 1 ›› ip: 31.170.163.50 - adresse: SOBACHKA.COMZE.COM
28-05-2013+15-58-08.png
[/URL]
28-05-2013+16-07-08.png


Old panel of the coder (ree4):
• dns: 1 ›› ip: 109.234.159.254 - adresse: REE4.7CI.RU
03-04-2013+21-00-05.png
[/URL]
03-04-2013+21-01-06.png
[/URL]
03-04-2013+21-02-01.png
[/URL]
03-04-2013+21-02-42.png


The panel is primitive like the malware himself.
28-05-2013+16-10-54.png


Conclusion: /facepalm

1369745900914.jpg


(c) https://www.xylibox.com/2013/05/dump-memory-grabber-blackpos.html
 
Last edited:
Top