The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Flowchart - Building next gen malware behavioural analysis environment
1. Extract Archive
Unpack file with UPX
Load TempKey in memory
“c9e0b830ff18645849b8dbab57e47
7b5”
CPU Check
if (cores < 3) { Exit; }
Check resources
If (!filexists(base*.dat)) {exit;}
Check Windows Version
If (!WinVistaOrGreater) {exit;}
Final Key
Key = TempKey XOR 0x03
Decoy
Base8.tmp = Base8.dat XOR Key
XOR0x08
Real sample
Base16.tmp = Base16.dat XOR key
Decoy
Base32.tmp = Base32.dat XOR Key
XOR0x32
Decoy
Base64.tmp = Base64.dat XOR Key
XOR0x64
Clean-up:
remove (base*.tmp)
Run sample
cmd /c base16.tmp
Identify .NET binary Decompile binary RansomKiller: MainApp
Write Registry Key
RAND 15 char = HKLMSoftware
SergSecKey
CPU Check
if (cores < 5) { Exit; }
Checks for MAC ofNetcard Checks for debugger
Checks for malware analysis
software
Detect HyperV
MainApp
Scan Buy product Update signatures Settings
goes through files, doesn’t do anything Open Register Form
Open Register Form
Checks for internet by connecting to
https://cyber-europe.net
Checks thekey by sending a GET
request to https://cyber-europe.net/
evl/ransomkill/reg.php
If (reply ==
“260CA9DD8A4577FC00B7BD5810298
076") { RegisterProduct; }
Enables all buttons of MainApp
Easter Egg: checks ifpublic key of
SergSec is installed in the CA Store
Downloads https://cyber-europe.net//
evl/ransomkill/update.rk
Check ifit’s a Thursday
Decrypt using AES-128 update.rk to
updt.exe
Gets AES Key = serial number of
SergSec public certificate
Executes updt.exe
Creates Task: binary to be ran on 12th
Oct 2016
Autoupdate: creates a Registry Key in
HKLMSoftwareSergSecAutoUpdate
= 1
Autostart: creates a Registry Key in
HKLMSoftwareMicrosoftWindows
CurrentVersionRun
RansomKillerAppbase16.tmp
Auto schedule: creates a weekly Task
in theWindows Task Scheduler named
RK_Weekly
Sign in
Easter Egg: if (user ==
“demo”)&(password==”demo”) {
AccessWebPanel; }
2. updt.exe
MainApp
Hides Window
Stalls Execution via Search
Stalls Execution via Math
Calculation
Checks for debugger
(Necromancy Check)
Deletes Old Logs
Anti-Forensics Checks
Username
Computer Name
Processes Running CheckChecks for debugger
(Running Proccess)
Stalls Execution via Search2
Keylogger ScreenGrabber
Sends data to:
10.210.1.12
Exfiltrator
Stores key strikes in:
rNdfgl34f.txt
Grabs Printscreen
test.jpg
500 Strikes
Persistance Deletes Logs