Cmstar

Description

(Palo Alto) This specific downloader, Cmstar, is associated with the Lurid downloader also known as ‘Enfal’. Cmstar was named for the log message ‘CM**’ used by the downloader.

The Cmstar downloader starts by manually building its import address table (IAT), much like shellcode would; however, it uses a rather unique technique. Instead of finding API function names based on their hashed values, this malware enumerates libraries’ export address table (EAT) and searches for the name of the API function the payload needs to load by using a character to offset array. The payload pairs several comma-separated lists of characters with comma-separated lists of numbers. Each list of characters consists of the set found within the API function name the payload seeks to add to its IAT, while the corresponding list of numbers specifies the offset in the function name where those characters should be placed.

Names

Name
Cmstar
meciv

Category

Malware

Type

  • Downloader

Information

Malpedia

Alienvault Otx

Other Information

Uuid

fc200bd2-4771-4e16-8d49-e231c20fdf63

Last Card Change

2020-05-13