Malware Analysis Probably Gen:Variant.Razy Static Analysis

tim one

Level 21
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Jul 31, 2014
1,086
SHA256: 353bc8b1706ab58fa70dc3e87f46854047b8b8b69421956073427cb937a2a82d
File name: 353bc8b1706ab58fa70dc3e87f46854047b8b8b69421956073427cb937a2a82d.exe
Detection ratio: 32 / 56
Analysis date: 2016-11-11 17:16:48 UTC

This malware is a Gen:Variant.Razy sample, according to the majority of detections on VT. It is coded in .NET, so as tool for the decompilation process I used .NET Reflector (Trial), according to my analysis it uses several functions to gain informations about Keyboard, Mouse, Clipboard, Screen, Audio and Ports.

c.PNG

c1.PNG

Probably it can log clipboard content and maybe also send it to a remote server (infact it uses a lot of methods of web services and connections, even if on Malwr report we can see it appearantly doesn't perform network connections).

Ca.PNG

That's probably because it can easily bypass online network monitoring. In the source code probably there are functions which contain list of majority online analysis tools, just an hypotesys.

c4.PNG


Finally in one of the screenshots you can see a function used to manipulate and perform byte operations on array of bytes (it gains as input two bytes arrays).

c5.PNG

Another interesting part of the code is that the class "MyComputer" is DebuggerHidden so it cannot be seen in the debugging operation, by clicking "Expand Methods" it doesn't appear nothing.
It uses some interesting objects such as ResourceManager, another array of bytes, an enumerator and the boolean variable "CopyBack".

c2.png


c3.PNG


This sample has a high VT ratio and the part of the code looks quite understandable, but as most of the malware analysis there is the subjective factor then please take this as a grain of salt.

Thanks! :)
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top