sha1:
- b82468b4e87c4900a04e8a5d88781bfe8f97fe08
Description
Malicious executable for OS Windows, written in Python, compiled with PyInstaller and obfuscated with BlankOBF v.2. It is dropped by Python.Muldrop.39 (fd7eee537605618826ed7dd236948964faa2252f) and saved in C:\ProgramData\Microsoft\smss.exe.
Operating routine
-
Creates a mutex Global\\prinesuplitku
-
Registers as a startup item by adding an entry chromeupdate that contains the path to the smss.exe file to the following registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run
-
Checks network access to https://api.telegram.org/. If the host can be reached, continues execution
-
Saves values of TOKEN и USER_ID to HKCU\Software\SOFTWARE\WindowsHohol. The TOKEN value is encrypted using AES CBC, the key is the SHA256 value of the kozlinets string
-
Sends a screenshot to threat actors
-
Automatically runs the following commands: /ip, /sysinfo, /telegram, /wallets, /discord, /browsers
-
Searches the clipboard for seed phrases. Sends them to threat actors, if the phrases are found.
Trojan commands:
/sc | Take a screenshot |
/ip | Send the IP address |
/cam | Take a webcam picture |
/rec *duration* | Take a recording with the microphone for the specified duration |
/video *duration* | Take a video recording with the webcam for the specified duration |
/lock *text* | Lock the screen and display a message |
/unlock | Unlock the screen |
/tell *text* | Display a message |
/sysinfo | Send system information |
/ls *path* | Show the contents of the current directory |
/pwd | Show the name of the current directory |
/cd *path* | Change the current directory |
/mkdir *path* | Create a new directory |
/rm *path* | Remove a file or a directory |
/mv *source path* *destination path* | Move a file or a directory from the source directory to the destination directory |
/size *path* | Display the size of the specified file or directory |
/download *path* | Download a file or a directory |
/open *path* | Open the specified file |
/copy *source path* *destination path* | Copy a file or a directory from the source directory to the destination directory |
/processlist | List all running processes |
/processkill *process* | Terminate a process with a given name |
/processpath | Get a path to the executable file that spawned a process with a given name |
/link *website* | Open the specified website and take a screenshot |
/alert *text* | Display an alert with the specified text |
/soft | List all installed programs |
/shutdown | Turn off the computer |
/restart | Reboot the computer |
/browsers | Collect all data about installed browsers |
/browsersforced | Collect all data about installed browsers, terminating their processes |
/telegram | Download all files from the tdata directory of Telegram Desktop |
/steam | Download all session files from Steam |
/telegramforced | Check availability of the tdata folders on all disks |
/discord | Collect Discord tokens |
/wallets | Collect crypto wallet data from browser extensions and desktop applications |
/seedfind | Search for potential seed phrases on all file systems |
/transfer *token$chat_id* | Transfer control to another bot with the specified token and identifier |
/terminate | Terminate the current connection |