周杰伦3/22/2025, 8:00:13 PM
文章分类软件逆向阅读数 : 8阅读时长 : 9分钟
【软件逆向-lummerstealer分析】此文章归类为:软件逆向。
autorun上看到一个3月15日新捕获的lummerstealer,简要分析一下
该样本有混淆,大致逻辑是将bss段的shellcode解密后,注入到MSBuild.exe中,所以着重分析一下shellcode,shellcode也被混淆了,功能大致分为3块
首先会连接C2,接收数据为加解密因子,内存中解出一份json数据
{
"v"
:
4
,
"se"
:true,
"ad"
:false,
"vm"
"ex"
:[
/
浏览器扩展
"en"
"ejbalbakoplchlghecdalmeeeajnimhm"
"ez"
"MetaMask"
},
"aeblfdkhhhdcdjpifhhbdiojplfjncoa"
"1Password"
"pioclpoplcdbaefihamjohnefbikjilc"
"Evernote"
"dngmlblcodfobpdpecaadgfbcggfjfnm"
"MultiversX Wallet"
"kppfdiipphfccemcignhifpjkapfbihd"
"ForniterWallet"
} ...
],
"mx"
"webextension@metamask.io"
"et"
"\"params\":{\"iterations\":600000}"
}
"c"
查找应用与对应路径
"t"
0
"p"
"%appdata%\\Ethereum"
"m"
"keystore"
"z"
"Wallets/Ethereum"
"d"
1
"fs"
20971520
"%appdata%\\Guarda\\IndexedDB"
"*"
"Wallets/Guarda"
2
},{
"%appdata%\\WalletWasabi\\Client\\Wallets"
"Wallets/Wasabi"
"%localappdata%\\Google\\Chrome\\User Data"
"Chrome"
"f"
"Google Chrome"
"n"
"chrome.exe"
"l"
"chrome.dll"
"%localappdata%\\Google\\Chrome Beta\\User Data"
"Chrome Beta"
"Google Chrome Beta"
"%localappdata%\\Opera Software\\Opera Neon\\User Data"
"Opera Neon"
"%appdata%\\Opera Software\\Opera GX Stable"
"Opera GX Stable"
"opera.exe"
"%localappdata%\\Microsoft\\Edge\\User Data"
"Edge"
"Microsoft Edge"
"msedge.exe"
"msedge.dll"
...
]
解析后,按照json中,逐一遍历路径,如果存在目标文件,通过天堂之门(32位程序手动通过WOW64,执行64位系统调用)技术,查询文件信息,读取文件内容,然后经过一系列处理,发回C2。其中WOW64系统调用时,传入的系统调用号可能是形如0x33(打开文件),0x11(查询文件信息)这种,也可能是0x1a0006(读取文件)、0x3000f(关闭句柄)这种,需要拆开来看,前16位,是给WOW64用的,wow64根据前16位,跳转到对应的系统调用处理函数。而后16位给内核用的,系统调用进入内核后,根据后16位,找到对应的服务描述符表,执行对应函数。
shellcode会创建msedge.exe进程
"C:\Program Files(x86)\Microsoft\Edge\Application\msedge.exe"
-
profile
directory
=
"Default"
remote
debugging
port
9223
利用远程调试的方式获取cookie信息
经过websocket握手后,shellcode会发送
"id"
"method"
"Storage.getCookies"
msedge会回复一系列cookie信息
"result"
:{
"cookies"
[
"name"
"pglt-edgeChromium-dhp"
"value"
"547"
,"
"_C_Auth"
:"
","
domain
":"
ntp.msn.
"USRLOC"
.msn.cn",
例如硬件信息、杀软信息、用户名等计算机信息会通过WMI的select语句查询,此外还会获取剪贴板、截屏等信息
C2:pistolpra.betweaponwo.lifearmamenti.worldselfdefens.bettargett.topcaliberc.todayloadoutle.life
sha1: 4130B70A8300FB43C040726E3D02341639E323B7
更多【软件逆向-lummerstealer分析】相关视频教程:www.yxfzedu.com