Challenge-Sillyputty

Malware Details


Name - putty.exe.malz Type - Backdoor

Hashes


MD5-

	MD5sum.exe putty.exe.malz

Output - 334a10500feb0f3444bf2e86ab2e76da *putty.exe.malz

SHA256-

	sha256sum.exe putty.exe.malz

Output -0c82e654c09c8fd9fdf4899718efa37670974c9eec5a8fc18a167f93cea6ee83 *putty.exe.malz

Virustotal results - Malicious

Architecture of binary - Intel x86

Static Analysis


Strings-

Tool used - FLOSS

Command -

Screenshot-->

Interesting Strings-->

IAT analysis-

Tools used - PEview

Interesting results -->

Malware is in the form of a windows portable executable

Looking at IMAGE_SECTION_HEADER.text we get,

Virtual size and size of raw data is approximately same. Thus the binary is an unpacked binary.

A lot of libraries and APIs have been loaded. This confirms that the binary is an unpacked one.

Now for further analysis , open PEstudio.

Bringing it all together-

Tools used - PEstudio

Interesting results -->

Potential Malware indicators -->

File-header (intel-386) -->

Flagged IAT Imports-->

Out of total 326 imports, 51 of them were flagged as malicious with majority of them being focused on windowing and execution. But this doesn't conclude anything as legitimate putty program also uses these APIs.

Dynamic Analysis


Initial detonation

Without network - A blue powershell window pops up and closes itself immediately.

A normal putty window opens. Most probably the malware detected the sandbox.

With network -

The same happens on detonation of the sample.

Network Analysis

Tools used- inetsim and wireshark.

After detonation and capturing packets from the malware-

We see a http request for 3 files one after the other in wireshark -

And a DNS request -->

for the domain address-->

This domain address doesn't exist in our network. So we edit out hosts file to point to the windows box .

Command-->

Host Analysis

Tools used - procmon , tcpview

We fire up procmon and detonate the malware.

A lot of processes load up. Looking up process tree we get -

A powershell command is running in the background. This must be the blue window we saw at the beginning.The command is -

There is also a conhost.exe (console host) running under powershell which must host the above command. This is the command for a remote shell which the malware author might be trying to exploit.

We can conclude that this is a backdoor.

Converting the base64 string we get to know that the malware opens up a port on localhost:8443 and only communicates with ssl/https. Thus in order to interact with the shell we type-

We run both the command and the malware and we get the shell -

Last updated