SECUINFRA Falcon Team

168 Followers
11 Following
65 Posts
Insights from the Digital Forensics/Incident Response and Threat Research Team at SECUINFRA. We regularly publish reports, detection rules and other findings!
Bloghttps://secuinfra.com/en/techtalk/
Twitter@SI_FalconTeam

The tool "innoextract" can be used to extract the - again massively inflated - payload "Howard.exe" from the installer file. We used @SquiblydooBlog's debloat tool (https://github.com/Squiblydoo/debloat) to shrink the file down to a more managable size.

Through dynamic analysis and YARA signature matches we determined that we are looking at a #Vidar stealer sample. The command and control server associated with this sample is opbafindi[.]com. Another sample that was identified later uses a different C2: durimri[.]sbs.

We are sharing the identified samples on @abuse_ch
Malware Bazaar and other platforms.

#IoC
Pirate.exe 57ed3e1505b3bd9dfb2fc85a8efce1e9
Howard.exe e3202e70c2d8aecf0347f85c4fb39032
Howard_patched.exe c5ad9a93b22622ae100aff54ae31dc8a

2nd sample 187f0daaedc4e8c01c538c1075036d77
opbafindi[.]com
durimri[.]sb

Samples:
https://bazaar.abuse.ch/sample/3f49f4966e72b07f32ad098eb941dd8a51e17fcb6a6ea056b6184afe766dc5ad/
https://bazaar.abuse.ch/sample/aed369919e5f5044598997297544de11d1184993eea935f6bafc65b51436c8dc/
https://bazaar.abuse.ch/sample/9c78a1243f82d3f5ea27d60b30524df41ef238482a4bc2ef0c414e14bed1d256/

Further information can be found in the @PCMag (@Michael_Kan) and @TechCrunch (@lorenzofb) reports below:

https://pcmag.com/news/did-you-download-this-steam-game-sorry-its-windows-malware

https://techcrunch.com/2025/02/13/valve-removes-steam-game-that-contained-malware/

#infosec #cybersecurity #steam #malware

GitHub - Squiblydoo/debloat: A GUI and CLI tool for removing bloat from executables

A GUI and CLI tool for removing bloat from executables - Squiblydoo/debloat

GitHub

🚨Malware distributed via Steam

Fancy a bit of after work gaming? Beware of infostealer malware distributed via the Steam store!

Using @SteamDB we managed to visually identify a very suspicious file in the game files. Luckily, we managed to retrieve a sample for analysis, which will follow in this thread.

The game, which was aptly named "PirateFi", was supposedly Free-to-Play and included web3 / blockchain references, likely as a lure for this specific player base. Steam removed the game from its store yesterday. Approximately 800 to 1500 users have reportedly downloaded PirateFi.

🆘 If you are one of the players who downloaded this "game": Consider the credentials, session cookies and secrets saved in your browser, email client, cryptocurrency wallets etc. compromised. Change passwords for all affected accounts and use Multi-Factor-Authentication where possible. The "game" files will have to be removed from your computer (Steam Libary, %Temp%).

Now onto the malware analysis. The sample of "Pirate.exe" that we managed to dig up is 693MB in size. This property is commonly found with infostealer malware as a low-effort aporach to detection evasion by Anti-Virus and sandboxes. We found that the file contains an InnoSetup installer, which we will have to unpack.

#cybersecurity #infosec #steam #malware

Greetings from @bsidesfra 👋 The talks have been great so far and there is more to come 😃 Also, we brought stickers! Remember: “#IoC or it didn’t happen.”
#bsides #frankfurt

📅 Upcoming event, primarily of interest for our German followers:

On the 10th & 11th of July we will present at the NIS-2-Congress in Stuttgart 🇩🇪. The event is focused on the implementation of the EU #NIS2 #cybersecurity directive and best practices around it.

Website: https://nis-2-congress.com
Linkedin Event: https://linkedin.com/events/nis-2-c

NIS-2-Congress 2024

Der NIS-2-Congress bietet eine einzigartige Gelegenheit, sich über die neuesten Entwicklungen, Best Practices und Strategien zur NIS-2-Konformität zu informieren und auszutauschen.

NIS-2-Congress
Greetings from #botconf 2024 in Nice! Looking forward to many interesting presentations and networking :)

#100DaysOfYARA

Today: Detecting the "qBit Stealer" exfiltration tool

qBit Stealer was developed by the "qBit #Ransomware-as-a-Service" group to exfiltrate victim data to the MEGA file sharing service. It is implemented in #Golang.

About two months ago the source code of qBit Stealer was published on BreachForums for anyone to use and repurpose (Image 1).

Based on the source code and the sample shared by @1ZRR4H (https://twitter.com/1ZRR4H/status/1751656174515098023), we created a YARA rule to look for qBit Stealer samples (Image 2).

Interestingly, most of the in-the-wild samples contain build artifacts of the "XFiltr8" variant, compiled by a user named "187ir".
We only found two other public samples that contain different path artifacts (Image 3).

Paths and hashes:
C:/Users/187ir/Golang-Projects/XFiltr8/Builder/XFiltr8.go
089ba2fb4eaa13b572ba558288592ed9
de2e25d217d28d1f360068048b5e4d54
bef9a0031387e0841166d41b047f8a13
fec2f286abc06554f68e5586a44662d5
03a18e5842e08a32d08703fe0c563687
e3211f650d932848a544d4da6f9fd599
1e6dca21cb0249525375e87358ff4fbc
4738ddef9cc4cd33dbbd616c722d5f46
97d87da8e4b22863681ef8eeef685826

C:/Users/benign_os/Desktop/malware_samples/3086/SMW3086/payloads/windows/qBitStealer/qBitStealer.go
f06c4a0af2181eb43a7b3763e8f5d5ea

C:/Users/lilia/Downloads/Telegram Desktop/qBitStealer/qBitStealer.go
b4247d41d89972d3a3cf34bca30c16f1

Samples will be shared via @abuse_ch Malware Bazar
The rules will be pushed to the 100DaysOfYARA and our detection repo :)
🍪

#infosec #cybersecurity

Germán Fernández (@1ZRR4H) on X

#opendir https://91.92.254.14/ "XFiltr8.exe" appears to be an exfiltration tool (written in Go) that uses MEGA services for storage via g.api.mega.]co.]nz. [+] https://t.co/T3dWYx5Elk ▪ "C:/Users/187ir/Golang-Projects/XFiltr8/Builder/XFiltr8.go" "Helpertask.exe" is #AsyncRAT…

X (formerly Twitter)
@xorhex @h2jazi Hey, of course, sorry. We committed it to the official repository https://github.com/100DaysofYARA/2024/pull/90
SI_FalconTeam Day 18: Adding a new rule and fixing one previous rule by f0wl · Pull Request #90 · 100DaysofYARA/2024

Hi there, committing the rule from this Twitter thread: https://twitter.com/SI_FalconTeam/status/1747980843983810700 Thanks in advance

GitHub

#100DaysOfYARA
Today: Detecting a .NET reverse shell used in targeted attacks

Two of the samples were first covered by @h2jazi (https://twitter.com/h2jazi/status/1747334436805341283). We found a third sample, here are the #IoC:

c914343ac4fa6395f13a885f4cbf207c4f20ce39415b81fd7cfacd0bea0fe093
C2: 192.121.162[.]228:8888
🇯🇵 M247 Tokyo

7581b86dd1d85593986f1dd34942d007699d065f2407c27683729fa9a32ae1d6
C2: 2.58.15[.]85:443
🇳🇱 Gwy It / Crowncloud

8920021af359df74892a2b86da62679c444362320f7603f43c2bd9217d3cb333
C2: 85.239.61[.]53:443
🇬🇧 Clouvider / BlueVPS

Samples will be made available through @abuse_ch Malware Bazaar as usual.

The implementation of the attack chain and malware itself are rather unsophisticated, you can find an overview of the latter in the second screenshot. It differs slightly from sample to sample.

We are not making an attempt at attributing this reverse shell to a specific threat group due to a lack of context/further information.

#infosec #cybersecurity

Jazi (@h2jazi) on X

Interesting #APT attack is exploiting cve-2023-38831 to target Pakistan: AbroadDuty. zip 2fe895b10d493cfef981aa708bbcc12d AbroadDuty.rar 7a2c0e0a7ac1d8b91654e762a098f120 Payload: put.png ce6a589d5e3604112e5595a1f8d53e1e C2: 185.243.113.187

X (formerly Twitter)

#100DaysofYARA

Today: Hunting for a code signing certificate issued to "D2innovation Co.,LTD"

Malicious use of this certificate have been attributed to #Kimsuky #APT by @asdasd13asbz (https://twitter.com/asdasd13asbz/status/1744279858778456325)

We currently can't confirm whether this is a stolen certificate, an impersonation or a shell/front corporation. The website for "d2innovation[.]jp" has been inactive/HTTP403 since early 2023 according to the Internet Archive.

So far we have found five samples signed with this certificate. The earliest compilation timestamps go back to the 13th of December 2023. One sample has a header timestamp set to 0 (1970-01-01). Using a cutoff date in the rule might limit hunting results.

Some samples are already available on @abuse_ch Malware Bazaar. We'll share the missing ones in a minute.

#IOC
27ef6917fe32685fdf9b755eb8e97565
88f183304b99c897aacfa321d58e1840
87429e9223d45e0359cd1c41c0301836
7b6d02a459fdaa4caa1a5bf741c4bd42
7457dc037c4a5f3713d9243a0dfb1a2c

Samples can be found here: https://bazaar.abuse.ch/browse.php?search=serial_number:8890cab1cd510cd20dab4ce5948cbc3a

#infosec #cybersecurity

hithere (@asdasd13asbz) on X

#Kimsuky #APT It has a digital signature, and malware is written in Go language 27ef6917fe32685fdf9b755eb8e97565 7b6d02a459fdaa4caa1a5bf741c4bd42

X (formerly Twitter)

#100DaysOfYARA
Today: Detecting use of "hXOR-Packer"

hXOR is an executable Packer/Crypter that, as the name hints at, uses Huffman encoding and simple XOR.

Another rule contribution for http://unprotect.it cc @fr0gger_

https://unprotect.it/technique/hxor-packer/

We generated test binaries for all settings supported by the Crypter and referred to the source code for more detection opportunities. Since open-source Crypters can be easily customized we opted to make most of the string matches "optional".

Two interesting points about the rule condition:

- The "AFIF" magic used to indicate the start of the payload is searched for in a range after the stub

- The Crypter uses a DOS Header reserved field at 0x28 to store a payload offset, we check that it is populated

The use of " in range" and the "none" keyword require yara version 4.2.0+.

During rule QA we found well over 1k true positive matches, we'll be investigating a few of those further.

A ping for @cyb3rops seems like there is no rule for hXOR present in Valhalla yet.

#infosec #cybersecurity

Home - Unprotect Project