Skip to main content

SMA: Sharpshooter Payload



Article by Vishal Thakur


This is a SMA of the payload used in the SharpShooter campaign.
The sample shows code-reuse from the Lazarus malware family but full attribution is hard to determine at this time.
The focus of this article is on the networking C2i.

Following is the complete URI for the first connection:


000007FEFA6ABA48 | 4C 8B DC                 | mov r11,rsp                             |
000007FEFA6ABA4B | 53                       | push rbx                                |
000007FEFA6ABA4C | 55                       | push rbp                                |
000007FEFA6ABA4D | 56                       | push rsi                                |
000007FEFA6ABA4E | 57                       | push rdi                                |
000007FEFA6ABA4F | 41 54                    | push r12                                |
000007FEFA6ABA51 | 41 55                    | push r13                                |
000007FEFA6ABA53 | 41 56                    | push r14                                |
000007FEFA6ABA55 | 41 57                    | push r15                                |
000007FEFA6ABA57 | 48 81 EC 88 01 00 00     | sub rsp,188                             |
000007FEFA6ABA5E | 48 8B 05 5B 8B 05 00     | mov rax,qword ptr ds:[7FEFA7045C0]      |
000007FEFA6ABA65 | 48 33 C4                 | xor rax,rsp                             |
000007FEFA6ABA68 | 48 89 84 24 70 01 00 00  | mov qword ptr ss:[rsp+170],rax          |
000007FEFA6ABA70 | 49 83 A3 78 FF FF FF 00  | and qword ptr ds:[r11-88],0             |
000007FEFA6ABA78 | 41 83 63 80 00           | and dword ptr ds:[r11-80],0             |
000007FEFA6ABA7D | 8B DA                    | mov ebx,edx                             |
000007FEFA6ABA7F | 33 D2                    | xor edx,edx                             |
000007FEFA6ABA81 | 41 8B F0                 | mov esi,r8d                             |
000007FEFA6ABA84 | 4C 8B F1                 | mov r14,rcx                             | rcx:L"https://www.kingkoil.com.sg/board.php"
000007FEFA6ABA87 | 44 8D 42 24              | lea r8d,dword ptr ds:[rdx+24]           |



Here's a view from the stack.
















The request:


000007FEFA6B4C03 | 41 83 BB 1C 01 00 00 02  | cmp dword ptr ds:[r11+11C],2            | r11+11C:L"tml,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-us;q=0.8;q=0.6,en-us;q=0.4,en;q=0.2\r\nContent-Type: application/x-www-form-urlencoded\r\nContent-Length: 384\r\nConnection: Keep-Alive\r\nCache-Control: no-cache\r\n"


POST req with the path:


The second connection:

POST req with the path:

UserAgent used:
Complete URI:
Third connection:

The request:
Sample: 37b04dcdcfdcaa885df0f392524db7ae7b73806ad8a8e76fbc6a2df4db064e71McAfee report: https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/operation-sharpshooter-targets-global-defense-critical-infrastructure/


Comments

Popular posts from this blog

Grinju Downloader: Anti-analysis (on steroids) | Part 2

  This malware takes anti-analysis and stealth techniques to a new level We took a look at this malware in the Part 1 of this publication. Now let’s carry on with the analysis and dig deeper into the various anti-analysis and stealth-exec features of this malware in Part2. Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju Secondary Macro Code First of all, here’s the entire code that is dumped in the sheet once all the macro functions have been completed. Take a look at these lines and try to figure out what they are meant to do. Then we’ll take a look at the most important of these briefly before moving on to the next section. =CLOSE(FALSE) =FORMULA(LEN(APP.MAXIMIZE())+-459,Sheet1!R18690C129) =FORMULA(LEN(GET.WINDOW(7))+-131,Sheet1!R18691C129) =FORMULA(LEN(GET.WINDOW(20))+-893,Sheet1!R18692C129) =FORMULA(LEN(GET.WINDOW(23)=3)+433,Sheet1!R18693C129) =FORMULA(LEN(GET.WORKSPACE(31))+864,Sheet1!R18694C129) =FORMULA(LEN(GET.WORKSPACE(13)>770)+707,Sheet1!R18

Grinju Downloader: Anti-analysis (on steroids) | Part 1

  This malware takes anti-analysis and stealth techniques to a new level Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju I’ve come across some great anti-analysis code in malware over the years. This one takes the top spot. On that note, let’s get into it, this is a long one! Since this malware employs a very complex structure, I’ve decided to divide the analysis into different sections. I’ll try to keep it as simple as possible but having said that, it really is a very complicated project. Hence, publishing in parts. TLDR: This is a very well-thought and equally well-written malware. There’s no VBA that you can analyse. The values and formulas that are used are spread across the worksheets to thousands of rows. The functions, among other things, are used to close the file, corrupt it and also delete the dropped scripts to make analysis extremely hard. In fact, you cannot analyse this malware without altering the code it self. Along the way, you’ll also

Emotet February 2019 Wk 4 C2i

OTX Pulse:https://otx.alienvault.com/pulse/5c74e87bf481ce4d9544c4ef Indicator type Indicator IPv4 107.10.49.252 IPv4 12.235.180.10 IPv4 133.242.164.31 IPv4 138.201.140.110 IPv4 147.135.210.39 IPv4 153.121.36.202 IPv4 167.114.210.191 IPv4 172.98.243.40 IPv4 173.21.116.239 IPv4 173.255.196.209 IPv4 173.8.8.73 IPv4 178.62.37.188 IPv4 187.138.90.97 IPv4 187.153.90.98 IPv4 191.92.83.137 IPv4 197.245.16.149 IPv4 208.78.100.202 IPv4 208.82.45.8 IPv4 211.115.111.19 IPv4 217.13.106.160 IPv4 24.151.31.150 IPv4 24.153.169.62 IPv4 24.185.185.187 IPv4 45.123.3.54 IPv4 45.63.17.206 IPv4 5.230.147.179 IPv4 50.31.0.160 IPv4 62.75.187.192 IPv4 62.75.191.231 IPv4 64.19.74.49 IPv4 64.228.72.40