Add cpth-aprv[.]com and related IP addresses - malware #724
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Phishing Domain/URL/IP(s):
Impersonated domain
Describe the issue
I found the malicious powershell script
https://cpth-aprv.com/verify.ps1
on urlscan, which contains the following:Stage One
Stage Two
The powershell script downloads vgqvs.bat from
147.45.44.131
and saves it as APack.bat. After stripping the extranous "%Se大%" strings from APack.bat we are left with the following:Stage two downloads
resafh7.exe
and loads the executable directly into memory using .NET reflection.Stage Three
The third stage can be examined with ILSpy. The method ConsoleApp167.Ynbvks contains
from which we can derrive the key used by ConsoleApp167.Ntilg
1/(6wHcy>ek9nCTA&9v
using the decoded key, we can decrypt the string in ConsoleApp167.Knvbl to deobfuscate the payload
Stage 3 deobfuscated payload, click to expand
Stage three uses processes hollowing to inject vtqrai.exe into
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
Stage Four
Using the information from the deobfuscated stage 3, we can obtain the final payload using
The final stage is detected as an xworm variant and contains functions for host management, performing DDoS attacks, enumeration, and taking screenshots. The final stage can be seen communicating with the c2 address
92.255.85.66
on port 7000Related external source
https://urlscan.io/result/e53be657-8a2b-4e78-9abc-a84cbf079d19/
https://app.any.run/tasks/bcccad3e-e418-4887-a297-31ae282fa1c6
https://any.run/report/7918f238b96671953525877b977087aa149af7a69d4a9743ab13d455fa8e68a9/bcccad3e-e418-4887-a297-31ae282fa1c6
https://www.virustotal.com/gui/file/408071990c584e623599239553b6f24fc92ff8e51c210b86fc169094b2f6bdeb/relations
https://www.virustotal.com/gui/file/b0438625c334172a122141e07e8abe25a3d5bf08bdb032bd59842ac47f90f221
https://app.any.run/tasks/93479da1-ae1f-4ab9-bd4b-551146b07f9f
https://any.run/report/b9321acd5582848dd946117d94aa70d3ae1f3a7a51971a13a7ceb0aad4199d6a/93479da1-ae1f-4ab9-bd4b-551146b07f9f
https://www.virustotal.com/gui/file/b9321acd5582848dd946117d94aa70d3ae1f3a7a51971a13a7ceb0aad4199d6a
Screenshot
Click to expand