Malware.unknown.exe.Malz

Static Analysis


Strings -

	Floss.exe <malware name>

Interesting strings-

This malware is written in nim. Now opening the file in peview.

It is also a 32 bit executable.

The values of virtual size and size of raw data aren't the same. So this is a packed executable.

The lack of IATs confirm that the malware is a packed executable. Now opening the file in pestudio.

The malware has 5 suspicious imports-->

Now we move onto dynamic analysis.

Dynamic Analysis


The malware sends a request for the dns address- hey.youup.local

The malware then continually makes http requests to that domain.

Maybe the malware is trying to exfiltrate data. Now we use tcpview to get host based network indicators.

The malware is making a lot of connections to the previous domain. Now using procmon.Adding some filters-->

We get a list of processes created by the malware.

We turn off inetsim and start fakedns.

we get dns requests for - [*].cosmosfurbootsemporium.local

Conclusion


yara rule -

Last updated