Malware.unknown.exe.Malz
Last updated
Last updated
Strings -
Interesting strings-
This malware is written in nim. Now opening the file in peview.
It is also a 32 bit executable.
The values of virtual size and size of raw data aren't the same. So this is a packed executable.
The lack of IATs confirm that the malware is a packed executable. Now opening the file in pestudio.
The malware has 5 suspicious imports-->
Now we move onto dynamic analysis.
The malware sends a request for the dns address- hey.youup.local
The malware then continually makes http requests to that domain.
Maybe the malware is trying to exfiltrate data. Now we use tcpview to get host based network indicators.
The malware is making a lot of connections to the previous domain. Now using procmon.Adding some filters-->
We get a list of processes created by the malware.
We turn off inetsim and start fakedns.
we get dns requests for - [*].cosmosfurbootsemporium.local
yara rule -