Log in

View Full Version : Fake AV malware to play with


Kayaker
July 21st, 2012, 18:54
tl;dr
I came upon a Fake Antivirus malware some may wish to look at. This one goes by the name of Live Security Platinum - oooh..

I renamed the original file to FakeAV.Vxe in order to prevent accidental double clicking. The password for the zip attachment is

malware

Play safe!



I often scan my spam folders for potentially interesting malware. I'm disappointed most of the time because they usually redirect to p0rn sites promising me exquisitely enjoyable sexual encounters until my head explodes. Not that that in itself would disappoint me, I just don't believe it.

I finally got a bite the other day, the infamous US Postal Service "Undelivered Mail" scam. The image redirected to a zip file containing an exe, with PDF icon, which I was supposed to double click on to "print a shipping label". The exe was a generic downloader virtually identical in function, though not details, to the one discussed here:

http://www.woodmann.com/forum/showthread.php?14576-Your-free-airline-ticket-is-ready

Various obfuscations and indirections ultimately leading to creating an svchost.exe process where the entry point is redirected to a mapped section which is the downloader code proper. The decrypted download URL pointed to

http://bing.com/afyu/?r=gate&gh=ac5962b5&group=1807rcm&debug=0


Unfortunately I couldn't get anything from that link, so instead I googled the string "http://bing.com/afyu/?r=gate" and came up with several hits on threatexpert.com. The entry seems to be gone all of a sudden, but one analysis mentioned that the dropper was trying to download the following file:

http://www.tsridharan.info/3.exe

This is the Fake AV malware in the attachment, which I retrieved with Wget.

It's actually amusing to watch, though it wouldn't be if your poor grandmother was the victim. Seems all my previously clean VM images are "infected" with exactly 38 malwares


It would be interesting to discuss your strategies for analyzing a system once infected with something with the capabilities of this Fake AV. Once the pop-up message appears that your system is "infected", none of your favorite RE tools will start.

Running CaptureBAT beforehand will glean some information on the installation of the malware. Having RKU running and doing a rescan after infection will also help, showing several code hooks. You can 'unhook' them, but that seems to be detected and the malware will rehook and close offending running processes (i.e. your RE tools).

I've read general descriptions about these fake AV's before, finally I've got one to play with.
Have fun.

Cheers,
Kayaker

N3mes1s
July 22nd, 2012, 01:47
In reference to md5 hash from threatExpert: BFED761761AE710ABC94F1EA4039527D

https://www.virustotal.com/file/e3fc3b165f4e9bc8f0a2e043bc6cdd9295d78e08fc4e309c9b2ca3203c618687/analysis/
http://malwr.com/analysis/bfed761761ae710abc94f1ea4039527d/

and
Quote:

╭─nemesis@masamune ~
╰─$ md5sum FakeAV.exe
fd912fa475dd7b1b82d5a2a8b22f095c FakeAV.exe


https://www.virustotal.com/file/c5d1708ee451c79478a1b480676f7e14e5a6c3b2933ace067664decc5b943070/analysis/
http://malwr.com/analysis/fd912fa475dd7b1b82d5a2a8b22f095c/

_genuine
July 23rd, 2012, 23:23
Im going to take a look at this thanks.

quasimorte
July 28th, 2012, 22:22
I ran into a FakeAV at one point that compromised over 1,500 av/anti-malware/detection tools through debug registry hacks. Due to this I have about 5 different log programs, 7 task manager replacements, and about 10 different registry editors in my tool box. Redundancy is the key when dealing with these things since there are always a few tools they miss in their attempt to prevent you from finding them.