General information
- malware name: ElectroRAT
- hash: 2a3b92f6180367306d750e59c9b6446b
1. Sandbox output
- Sandbox: ANY.RUN
- Link: https://app.any.run/tasks/c40b44a1-0f8a-4c76-86b4-d6728e28ee34
2. Basic PE inspection
Overview
Let’s do a static analysis of the sample. We start with Detect It Easy showing us the following output:
It reveals a C++ writter malware using Microsoft Linker. We also see some calls to set
security_cookie
, typically of Visual Studio compiler. From the entropy menu we get that the global entropy is under the threshold, so the sample might not be packed:
Sections
From PE Studio we have another indicator that the malware is not packed, since there’s no huge difference between virtual size and raw size
Imports
All the imports flags as suspicious by PEStudio are those:
Generally, we can assume already 3 activities done by malware:
- IAT function hiding: here,
GetModuleHandle[Ex]W
andGetProcAddress
are used to dynamically solve the imports so they don’t show in a static analysis tool - Connecting back to rogue server:
InternetOpenW
,InternetReadFile
,InternetCloseHandle
,InternetOpenUrlW
,HttpOpenRequestW
,HttpSendRequestW
et similia should be investigated to actually understand what is sent and possibly what is received - Injection:
GetThreadContext
,SetThreadContext
,SuspendThread
,ResumeThread
,WriteProcessMemory
are good candidates to some process injection
Strings
We highlight the most relevant strings found:
D:\Mktmp\NL1\Release\NL1.pdb
: nothing particular, but the pdb path could possibly leak the usernameNL1
that can be used as an IOC for the threat actor name!"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_``abcdefghijklmnopqrstuvwxyz{|}~
: alphabets may indicate that there is some obfuscation method used inside the logicAVAST Software
,Avira
,Kaspersky Lab
,ESET
,Panda Security
,Doctor Web
,AVG
,360TotalSecurity
,Bitdefender
,Norton
,Sophos
,Comodo
: all these strings might be used for comparison when scanning for AV software present in the system
Resources
ResourceHacker reveals no resources embedded inside the malware.
3. High-level description of the sample
Description
At the start, malware spawns different threads each one doing with a specific task.
This malware implement the most basic activities of a RAT. There’s info extraction through
GetUsernameW
and other Win APIs, network activity through DNS, persistence and not-so-sophisticated evasion mechanisms.
Evasion mechanisms
Malware tries remove a local proxy probably to contact outside websites when doing network activity. It does that by setting some proxy reg keys inside the path HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
.
Also, scanning software is checked by malware before revealing its malicious activities.
Persistence
Malware puts itself inside Windows managed tasks. It accomplishes that using schtasks.exe
, the Windows Task Scheduler service.
Files and registry activity
The following list includes the registry keys touched by malware
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
:ProxyBypass=1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
:UNCAsIntranet=1
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
:IntranetName=1