Mr.Trunk · @mrtrunk
6 followers · 11761 posts · Server dromedary.seedoubleyou.me
dispatch · @dispatch
567 followers · 3288 posts · Server ioc.exchange
ITSEC News · @itsecbot
1408 followers · 36504 posts · Server schleuss.online
Mr.Trunk · @mrtrunk
6 followers · 11660 posts · Server dromedary.seedoubleyou.me
Br3akp0int · @Br3akp0int
36 followers · 14 posts · Server infosec.exchange

been seeing a bat-crypter being used by and other malware as a loader. so might be this analysis and my simple python script to extract the enc payload on that .bat file might help. 😊 1/4

github.com/tccontre/KnowledgeB

2/4 the .bat crypter create a series of env variable containing a string that will be concatenated to generate the powershell that will decode, decrypt and load the actual payload. we can dump pwh in process or just exploit the technique by simple 'echo' 😊

3/4 upon running the modified .bat it will dump the pwh that will decode, decrypt (aes) and decompress the actual payload. you can either modified the actual powershell or use cyber chef to decrypt the actual payload.

4/4 doing it 1 by 1 might be exhausting, so I creates a simple python script (shared above) to automatically decrypt and extract the payload from this bat-crypter loader. (specifically designed for this bat-crypter format) it also generate dbg log.

#AsyncRAT #redline #dcrat #int3 #malwareanalysis

Last updated 3 years ago


70e4ab510f22446f64090ef55942b7a3

#dcrat

Last updated 3 years ago

ITSEC News · @itsecbot
856 followers · 32557 posts · Server schleuss.online

Malicious campaign uses a barrage of commodity RATs to target Afghanistan and India - Cisco Talos recently discovered a threat actor using political and government-them... feedproxy.google.com/~r/feedbu

#rats #dcrat #maldoc #securex #quasarrat #crimeware

Last updated 4 years ago