Summary:
HawkEye, also known as PredatorPain, is a long-standing malware primarily functioning as a keylogger but has evolved to include functionalities typical of stealers. Initially emerging in 2008, it gained notoriety through spearphishing campaigns and has been utilized by various threat actors. Its delivery methods have diversified over time, and it has shown resilience in adapting to new evasion techniques and maintaining persistence on infected systems.…Author: AnyRun
Summary:
This article analyzes two infection techniques used by AsyncRAT malware via open directories. It highlights the evolving methods attackers employ to exploit publicly accessible files, showcasing the persistent threat posed by AsyncRAT and its diverse strategies for infiltration and control.Keypoints:
AsyncRAT is a Remote Access Trojan (RAT) used for spying and data theft.…Short Summary:
This article discusses packers and crypters, which are tools used to complicate malware analysis. It explains the differences between the two, their detection methods, and various tools that can assist in unpacking and analyzing malware samples.
Key Points:
Packer: Compresses files into a single executable, making detection difficult.…The article from ANY.RUN discusses recent cyber threats identified in October 2024, focusing on the APT-C-36 group, known as BlindEagle, which targets the LATAM region through phishing attacks. It details their tactics, including the use of Remote Access Tools (RATs) like Remcos and AsyncRAT, and highlights other phishing campaigns exploiting fake CAPTCHA prompts and encoded JavaScript files.…
Short Summary:
The article provides a comprehensive analysis of the DarkComet Remote Access Trojan (RAT), detailing its capabilities, methods of infection, and the technical mechanisms it employs to evade detection and maintain persistence on infected systems. DarkComet allows attackers to remotely control systems, steal sensitive data, and execute various malicious activities while remaining stealthy and difficult to detect.…
Short Summary:
The article provides a detailed analysis of PhantomLoader, a malware loader that disguises itself as a legitimate DLL for antivirus software. It is used to deliver a rust-based malware called SSLoad, which employs various evasion techniques. The analysis outlines the infection chain, including the use of phishing emails, malicious Office documents, and advanced obfuscation methods.…
Short Summary:
This article discusses recent phishing campaigns analyzed by ANY.RUN researchers, focusing on the Tycoon 2FA Phish-kit and its various evolutions. The campaigns utilize compromised Amazon SES accounts and employ sophisticated techniques to deceive victims into revealing their credentials through fake error messages and legitimate-looking links.…
“`html
Short SummaryThe DeerStealer distribution campaign involves malware spread through fake Google Authenticator websites. The malware captures user information and downloads a stealer hosted on GitHub. It communicates with a Telegram bot and employs obfuscation techniques to hinder analysis. The campaign is linked to previous malware families, suggesting a common author.…
Editor’s note: The current article is authored by Mohamed Talaat, a cybersecurity researcher and malware analyst. You can find Mohamed on X and LinkedIn.
Brute Ratel C4 (BRC4) is a customized, commercial command and control (C2) framework that was first introduced in December 2020.…
A recent update by CrowdStrike on July 18, 2024, resulted in a worldwide outage, causing significant disruption for users who were left with blue screens of death (BSODs) on their devices.
Cybercriminals seized the opportunity to target affected users with phishing scams and malware disguised as updates or hotfixes. …
In this post we detail our comprehensive investigation into the phishing campaign encountered by our company. Our aim is to help others better understand this ongoing threat and take steps to protect themselves.
Here are some key findings:
We found around 72 phishing domains pretending to be real or fake companies.…Malware authors use protectors like Themida and VMProtect in the hope that they will completely prevent analysts from reversing samples.
These protectors can use sophisticated techniques to hide malicious functionality: code virtualization, obfuscation, anti-debugging, compression, and encryption.…
In this article, we’ve prepared a brief overview of UAC bypass methods in Windows 11 that are used in modern malware and provided examples of their implementation in active threats. We’ll cover:
Exploitation of COM interfaces with the Auto-Elevate property Modification of the ms-settings registry branch Infinite UAC Prompt Loop (social engineering)Let’s investigate these methods. …
Attackers often place malicious payloads on remote servers, which are then downloaded and executed on the user’s PC using scripts or other methods. One type of server attackers can leverage is WebDAV (Web Distributed Authoring and Versioning) — a file transfer protocol built on top of HTTP.…
In order to understand malware comprehensively, it is essential to employ various analysis techniques and examine it from multiple perspectives. These techniques include behavioral, network, and process analysis during sandbox analysis, as well as static and dynamic analysis during reverse engineering.…
The following research was conducted by Anna Pham, also known as RussianPanda, a Senior Threat Intelligence researcher and a guest author for the ANY.RUN Blog. For more of her expert insights, follow her on Twitter/X.…
Every now and then, you come across a situation where you need to get hands-on to understand how an exploit or malware works and then create a detection rule. Plus, there are times when it’s essential for the attacking machine to be on the local network to capture network traffic or utilize its own detection tools.…
In this article, I’ll guide you through the analysis process of DCRat using ANY.RUN.…
In the modern world, it is rare to encounter purely clean malware during analysis. Malware code is commonly modified to hinder researchers from analyzing and decompiling it.
Software that alters code to hinder analysis is known as obfuscators.…
Lena aka LambdaMamba
I am a Cybersecurity Analyst, Researcher, and ANY.RUN Ambassador. My passions include investigations, experimentations, gaming, writing, and drawing. I also like playing around with hardware, operating systems, and FPGAs. I enjoy assembling things as well as disassembling things!…
Editor’s note: The current article was originally published on May 13, 2021, and updated on January 26, 2024.
Today we face a growing number of cyberattacks. Analysts can use the intrusion detection system to identify, minimize, and stop threats.…
In this article, we’re analyzing one of the most unusual crypters— PureCrypter, and a multifunctional stealer — PureLogs. We’ll look at several examples and identify patterns among Pure-malware families, and also explain how to detect PureCrypter and PureLogs. …