hiphoppoy.blogg.se

Free download 360 total security
Free download 360 total security













free download 360 total security

Meanwhile, another script checks if the process “360tray” belonging to the 360 Total Security solution is running: If the discretionary access control list modifications with icacls fails, the error report with parameter “z” is sent. If the app is found and is unpatched, the error report with parameter “b” is sent.

  • If the MeiQia app is not found, the error report with parameter “a” is sent.
  • In case of failure, the server may call the following requests: To learn more about the success or failure of the infection progress, parameters such as COMPUTERNAME and USERNAME are exfiltrated to the report-collecting server. The batch scripts for collecting reports about installation progress The Golang shellcode runner is used as a form of obfuscation. If Cobalt Strike has not been installed yet, then it is downloaded and executed. The batch script for downloading and installing Cobalt Strike After the timeout expires, the script will automatically submit the content to a typosquatting domain. html file contains one form, one input text with the computer name, and one text area with stolen content. html file and submitted to the information-collecting server with the help of headless Chrome (without visible UI) or Internet Explorer (if submission with Chrome fails). It attempts to steal *.txt files in “ \desktop\,” “ \Telegram Desktop\,” and MeiQia cookies in “ \AppData\Roaming\\cookies.” These files are included in a specially crafted. The malware operator was likely inspired by this blog post. The Cobalt Stike stager is usually encrypted (XOR, AES), encoded (Base64, hexadecimal), and embedded into a Golang shellcode runner to make payload detection more difficult.

    free download 360 total security

    Regardless if the embedded shellcode is the stager or the custom batch script, we noticed that the set of malicious operations that were being performed were largely the same:Ģ) Steal cookies and other important filesĥ) Provide information about the infection progress by communicating with the report-collecting server, among others The Cobalt Strike stager The embedded shellcode can either be a Cobalt Strike stager or a complex batch command capable of stealing credentials, and downloading and running other scripts and files. Water Labbu reuses the available code, obfuscates it with one or more layers of obfuscation ( sojson.v4, 5), before executing the custom shellcode. The Metasploit module for this vulnerability is publicly available. The “tongji.js” script is a JavaScript containing CVE-2021-21220 exploit code, with a shellcode that is a Cobalt Strike stager.

    #Free download 360 total security code#

    These files are hosted inside Water Labbu’s code repository. The last stage involves the creation and loading of a new script called “tongji.js,” which in Chinese means 痛擊 (to deliver a punishing attack). When the weaponized HTML pages detect a vulnerable target, it will proceed with loading additional stages of the attack. It’s likely that these are the lures Water Labbu used to communicate with the targeted cryptocurrency scam websites. If the User-Agent does not match, it will either redirect victims to the official MeiQia website or create a new iframe to load screenshots from banking or cryptocurrency transactions. It also detects the strings “0.0.8 Chrome/83,” “s/0.0.7,” or “s/0.0.6,” to identify if it is running inside a vulnerable version of Chromium or MeiQia application. The script detects strings such as “electron” and “圆4” to discover Electron-based applications and 圆4 architecture. The weaponized HTML pages contain JavaScript that uses the User-Agent to identify whether the environment of the victim is vulnerable.

    free download 360 total security

    The latest version of MeiQia is not vulnerable because it runs on the newer version of Chromium core and also opens the external links, not inside the ElectronJS app, but via the default system web browser. Review of the code shows that old versions of MeiQia open external links inside their ElectronJS applications and render the web page without sandboxing. The initial scammers used an old version of MeiQia, which might be vulnerable to exploits. We found weaponized HTML pages created by Water Labbu that leverages the same Chromium vulnerability to attack the MeiQia application. In this scenario, it leveraged cross-site scripting (XSS) techniques to force the exploit to be rendered in a window without sandboxing. A recent research paper on Electron security demonstrated a successful exploitation of an Electron-based application using CVE-2021-21220. The infection is initiated when) the initial scammer (in essence, the victim) opens a weaponized webpage (likely sent to them via livechat).















    Free download 360 total security