Good day everyone!
Ryan R. at Intezer shares with us their work analyzing the #BabbleLoader, which is an "extremely evasive loader, packed with defensive mechanisms that is designed to bypass antivirus and sandbox environments to deliver stealers into memory".
There is a TON of analysis and intel here, so I am going to try and highlight the parts that I find significant and actionable!
Defense Evasion:
- The malware checks the installed graphics adapters to see if it is running in a sandboxed environment or not. This leverages the dxgi.dll which is the DirectX Graphics Infrastructure library.
- It checks the amount of unique running processes in the machine by calling NtQuerySystemInformation. The magic number is 85 unique processes with the assumption that a true infected computer would have more running processes that a sandbox would.
Next Stage:
- The next stage involves a Donut loader which, according the the GitHub README states: "Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies.[1]"
- The ultimate payload in these examples were WhiteSnake and Meduza Stealers.
Hunt opportunity:
In this case, because the Donut loader and other payloads involved use command and control as their communication, there is an opportunity to run an unstructured hunt for "new" or anomalous connections. The article also mentioned that the WhiteSnake stealer uses the TOR network for C2 which would involve the installation on the victim's machine, which is another opportunity to find something suspicious.
Well, I am SURE there is plenty of information that is critical to everyone else BUT that is why it is time for you to read it for yourself! Enjoy and Happy Hunting!
Babble Babble Babble Babble Babble Babble BabbleLoader
https://intezer.com/blog/research/babble-babble-babble-babble-babble-babble-babbleloader/
Supplemental [1]:
GitHub/TheWover/Donut
https://github.com/TheWover/donut
Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday Cyborg Security, Now Part of Intel 471