Sneepy

Description

(Rapid7) The main backdoor installed and executed on the victims’ systems appears to be a custom reverse shell with just a handful of features. Due to a lack of public literature about this case, I decided to dub this family as ByeByeShell.

When disassembling the binary you can quickly understand the mechanics of the backdoor. After some quick initialization, the backdoor XORs an embedded string with 0x9D to extract the IP address of the C&C server. Subsequently it establishes a connection to it (generally on port 80) and checks in with some basic information about the system.

After the check-in message is sent, the malware enters a continuous loop in which it will keep silently waiting for commands from the open socket connection. From now on, it expects some manual interaction from the attacker.

The supported commands are: • shell • comd • sleep • quit • kill

Names

Name
Sneepy
ByeByeShell

Category

Malware

Type

  • Reconnaissance
  • Backdoor

Information

Malpedia

Alienvault Otx

Other Information

Uuid

a14d2307-9669-4ae7-afd3-f2af09e498b2

Last Card Change

2020-05-14