Squiblydoo

@squiblydoo@infosec.exchange
193 Followers
342 Following
109 Posts
Malware analysis (mostly SolarMarker)
In depth analysis at: Squiblydoo.Blog
Creator of bloated malware handling tool "Debloat": https://github.com/Squiblydoo/debloat

Impostor certificate:
EV Code-signing certificate "Yurisk LLC", used to sign fake NordPass installer.

Abused and revoked within 1 week of issuance. Company registration says they transport freight.

https://bazaar.abuse.ch/browse/tag/Yurisk%20LLC/

MalwareBazaar | Yurisk LLC

Malware samples associated with tag Yurisk LLC

#100DaysOfKQL

Day 91 - Large EXE or MSI File Observed in User Downloads Folder

Featuring a shoutout to debloat by the awesome @squiblydoo ! Go check it out (and also his certReport tool, #ImposeCost as they say)

https://github.com/SecurityAura/DE-TH-Aura/blob/main/100DaysOfKQL/Day%2091%20-%20Large%20EXE%20or%20MSI%20File%20Observed%20in%20User%20Downloads%20Folder.md

Fake SCPToolkit uploaded to MB by aachum:

Signed EXE "jmutanen software Oy" loads an MSI and the real SCPToolkit as a decoy. Installs ScreenConnect: microsoftnet[.]ru

Files from signer: https://bazaar.abuse.ch/browse/tag/jmutanen%20software%20Oy/

Zip with parts:
https://www.virustotal.com/gui/file/1dff513d05c2d51b18ad7f4fda789347760fc84e02cb88edb5d974f32589cf40/details

Triage: https://tria.ge/250401-nj9cmazqs2/behavioral1

MalwareBazaar | jmutanen software Oy

Malware samples associated with tag jmutanen software Oy

Signed DLL, 2/70 hits on VT? https://virustotal.com/gui/file/2240ccae318ec18f421d7b539b610abcda114edcd60e4da96e8ca7e502d9f6bd/behavior

Actually easy to see it downloads from PasteBin and excludes C:

I created a course with KC7Cyber
to showcase and educate: https://kc7cyber.com/modules/VT101

I like to promote it because I know details like these get looked over.

VirusTotal

VirusTotal

Dang. Black Basta spending $500 to run a campaign and $4,000 for the Extended Validation certificate. 🤯

Great to see the code-signing certificate abuse the other side. Great use of Cert Central: tying certificates BB talked about back to the actual malwares.

https://expel.com/blog/code-signing-certificate-abuse-in-the-black-basta-chat-leaks-and-how-to-fight-back/

Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)

Ransomware gang Black Basta's chats were recently leaked, proving how they abuse code-signing certificates. Here's how to defend against it.

Expel

Signed malware "Webber Air Investments LLC"
First seen 23 days ago targeting YouTubers, rip.

Vidar C2: 95.217.30.53
https://bazaar.abuse.ch/browse/tag/Webber%20Air%20Investments%20LLC/

MalwareBazaar | Webber Air Investments LLC

Malware samples associated with tag Webber Air Investments LLC

Ya'll will start seeing more files signed by Microsoft.
Please report them to centralpki@microsoft[.com or just tag me at a minimum, please.

Microsoft has been good at revoking them

This week, I've seen.
Lumma Infostealer
QuasarRAT
CobaltStrike (C2: uuuqf[.]com)

example: 40183652b178bbb018185d714c0d023d81ce1943183eb7f563ad58fc2925cd88

www.malwr4n6.com/post/dealing... explains PE file padding and how to defeat one padding technique: manually and with tools (like with my debloat tool https://github.com/Squiblydoo/debloat).

Understanding the technique is important. This technique accounts for essentially 78% of bloated files (out of 1000).

Debloat handles 91% of examples but only PE files.
When attackers use this technique with other file types, you'll be on your own until debloat adds support.

GitHub - Squiblydoo/debloat: A GUI and CLI tool for removing bloat from executables

A GUI and CLI tool for removing bloat from executables - Squiblydoo/debloat

GitHub

Fake Zoom reaches out to Namecheap domain ZoomInstaller[.]com

Fake MagicApp also installs Zoom; reaches out to Github and Namecheap domain MagicVision[.]io

Both suspiciously over 100MB due to .NET resource.
https://tria.ge/250308-mqs4jswjv3/behavioral2
https://tria.ge/250308-mpm6xavzdw/behavioral2

Certificate reported.

 5705ba9c6c35cc9b6cfec8de204ce5e749a7794463705587015b682460e7f4e3 | Triage

Check this report malware sample 5705ba9c6c35cc9b6cfec8de204ce5e749a7794463705587015b682460e7f4e3, with a score of 7 out of 10.

Certificate signing DarkGate malware reported: "BLVS Tech Inc."

DarkGate gets signed with a code-signing certificate fairly often. CertCentral.org is tracking 23 instances, I'm sure it happens more than that though.

https://www.virustotal.com/gui/file/e92f111b8aa01289f72c66585219861e0117c9939de56741cbb234fee55536fe/community

https://bazaar.abuse.ch/browse/tag/BLVS%20Tech%20Inc/

VirusTotal

VirusTotal