Remote CMD/PowerShell terminal

Description

(Kaspersky) The malware was first seen packed with VMProtect; when unpacked the sample didn’t show any similarities with previously known malware. All the strings and settings were encrypted and obfuscated. Functionality was identified that enables HTTP communication with the C&C server and invokes “processcreate” based on parameters received as a response.

The configuration and strings are encrypted using 3DES and Base64 encoding. Data sent to the C&C server is also encrypted using 3DES and Base64. Different keys are used for local and network encryption.

The malware starts communicating with the C&C server by sending basic information about the infected machine. The C&C server then replies with the encrypted serialized configuration.

The malware basically provides a remote CMD/PowerShell terminal for the attackers, enabling them to execute scripts/commands and receive the results via HTTP requests.

Names

Name
Remote CMD/PowerShell terminal

Category

Malware

Type

  • Reconnaissance
  • Backdoor

Information

Other Information

Uuid

d67dfeb0-ad1f-48f7-ac1e-8d932318b044

Last Card Change

2020-04-20