Post

Let's Defend: DLL Stealer

Let's Defend: DLL Stealer

Challenge Link: https://app.letsdefend.io/challenge/dll-stealer

Scenario:

1
You work as a cybersecurity analyst for a major corporation. Recently, your company's security team detected some suspicious activity on the network. It appears that a new DLL Stealer malware has infiltrated your system, and it's causing concern due to its ability to exfiltrate critical DLL files from your system.

File Location: C:\Users\LetsDefend\Desktop\ChallengeFile\sample.zip

File Password: infected

Question 1

What is the DLL that has the stealer code?

After unzipping the challenge folder I found a sample file. I didn’t have a lot to go off of so I right clicked it and opened it in dotPeek.

Open with dotPeek

I then had to wait so long for it to open I thought it wasn’t working. Once it finally loaded I right clicked on the file name, then Extract Bundle Contents to Folder which let me extract the DLL files to a folder of my choosing. I just chose the ChallengeFile folder.

Extract Bundle Contents

Once the DLLs were extracted I noted that I had two in particular:

  • Colorful.dll
  • Test-Anitnazim.dll

Extracted DLLs

Opening these in Notepad++ was useless so I tried dotPeek again and started with colorful.dll. Scrolling through the code it appears to be running CMD commands to copy a lot of data from various user folder such as %appdata% .

Possible Stealer Code

With how suspicious this all looked I was pretty sure I had my answer.

Answer:

colorful.dll

Question 2

What is the anti-analysis method used by the malware?

I continued to look through the code and found an IsVirusTotal() function that appears to be used to for a check, and exits if the check is true.

IsVirusTotal

Presumably this function is checking the system for evidence of VirusTotal and stops running if it finds it. This could server as an anti-analysis method.

Answer:

IsVirusTotal

Question 3

What is the full command used to gather information from the system into the “productkey.txt” file?

This question was fairly straight-forward. I just CTRL+F‘d  the keyword “productkey.txt” which led me straight to the full command.

productkey.txt

Answer:

wmic path softwareLicensingService get OA3xOriginalProductKey >> productkey.txt

Question 4

What is the full command used to gather information through the “ips.txt” file?

Same strategy as last question.

ips.txt

Answer:

ipconfig/all >> ips.txt

Question 5

What is the webhook used by the malware?

It feels like cheating but I just used the same strategy yet again, this time searching for the keyword “webhook” and found a discord link.

webhooks

Answer:

https://discord.com/api/webhooks/1165744386949271723/kFr6Cc0DSTK1jB8aV3820mBxji06gF2KorUuO2Rd2ckLkhUEHxdi6kv6UHwgJ_W82fgZ

This post is licensed under CC BY 4.0 by the author.