For the past few years, Discord has been a hub for spreading malware, and while they have done much to crack down on this spread, the problem is still prevalent. The malware I found today on the app.any.run was minimally malicious but showed how trojans could easily be downloaded and executed by unknown individuals using the discord application. Because of the nature of this malware and the disgusting imagery that it shows, I will be limiting the screenshots to code. Still, I will be providing the code, downloaded payloads, and everything used in the malware so that it can be looked at and documented sometime in the future.
The initial payload is small. A file called minecraft.bat is only 12 lines long. It downloads an attachment from Discord called minecraftcracked.jar and then executes it. It then runs rundll32.exe on user32.dll, calling UpdatePerUserSystemParameters.
minecraft.bat
Sha1: 2c8e1fef7cb658a82a79c8d63f427d77074f6d27 Sha256: 29ec5be083d89ba07fbdebf451709b3c1f8141790557984e5a513d0758f83c9a
mincraftcracked.jar
Sha1: cb8f50150230d8d384cae57f6d0e7d167da8efce Sha256: a18fe9977d6f99eaa9676cabf0994ad60a7f52a2b730e9b15f91ff4632b8ad85
Because of the naming conventions of the downloaded files, I can assume that this is a trojan of sorts. Using the tool JD-GUI, I was able to decompile the jar file completely. It was nothing more than a downloader of images. These images are then displayed on the screen. I suspect this was done to embarrass the unsuspected victim. The only thing odd about these images is that some are incredibly large. One is 16 MB and the other 17 MB.
I, therefore, had a hunch about them and using the tool binwalk, I was to extract a hidden QNX6 file system from one of the images. This was not mountable, but it was soon determined that this file system had been encrypted. No signature or key could be found based on my current abilities, and no further evidence of the running program shows that this file system goes through any decryption stage. This leaves only room to theorize.
This may be a first-stage attack, and this file system could have very important data within it, and a second payload downloaded could be used to decrypt and then utilize the file system in some way. I will hold on to the file system for further analysis.
Network Markers
Warning – Images are disturbing
- https://rule34.xxx/index.php?page=dapi&s=post&q=index&tags=femboy&limit=30
- https://api-cdn.rule34.xxx/images/4839/a203c5916bada40365a0638dc1f77867.jpeg
- https://api-cdn.rule34.xxx/images/4839/4ddc14e1e143c725dd455a7bde0dde3a.jpeg
- https://api-cdn.rule34.xxx/images/4763/ea3919a80dbc1a3b73a3c006fa2cd2a2.jpeg
- https://api-cdn.rule34.xxx/images/4709/c994385cfec04580dc4c412504bb2d66.jpeg
- https://api-cdn.rule34.xxx/images/4839/250a3650d4ec3c8c750feae2932ad361.jpeg
- https://api-cdn.rule34.xxx/images/4839/e4839a8b7ccb0e52e06b588b65af0bae.jpeg
- https://api-cdn.rule34.xxx/images/4839/1b1457496317c87d5c0277146ab0f521.jpeg
- https://api-cdn.rule34.xxx/images/4839/6f8de18fc05cfb8b2398a304e7de6735.png
- https://api-cdn.rule34.xxx/images/4839/26b63491fc1804b05a7bb87224189ad4.png
- https://api-cdn.rule34.xxx/images/4838/8676fa4fff25133bfc1c30cc8956851d.png
- https://api-cdn.rule34.xxx/images/4838/1249712254833dcd886b659069e85ff2.png
- https://api-cdn.rule34.xxx/images/4838/7d4e28dbf9462138c0e52cdd2855ca4a.png
- https://api-cdn.rule34.xxx/images/2638/8d770da2d3dc49919d2772b6ed96cb89.png
- https://api-cdn.rule34.xxx/images/4838/d00761320eabd15fa0924fbf6fcef3cc.png
- https://api-cdn.rule34.xxx/images/4838/2f7e910d86f335471bef622aa9750de7.jpeg
- https://api-cdn.rule34.xxx/images/4838/c2ae554262417334bd0b4c81fc689830.png
- https://api-cdn.rule34.xxx/images/4838/33c54ec5fd0f832fc46a673996d5f597.png
- https://api-cdn.rule34.xxx/images/4838/40a2170628e839e9af1a7617d272a4d4.jpeg
- https://api-cdn.rule34.xxx/images/4838/18f02cf454c9954b4d7e38e2c4b69fb7.png
- https://api-cdn.rule34.xxx/images/4838/2abd759921ed6fabd576da06c6b14451.png
- https://api-cdn-mp4.rule34.xxx/images/4838/fd74630a2c9f2a4f056d25611b11f593.mp4
- https://api-cdn-mp4.rule34.xxx/images/4837/d9eebd7cdbd3273b24f247dbbc569958.mp4
- https://api-cdn.rule34.xxx/images/4837/92ac4b008b16641537f5a3cdfe965bd0.jpeg
- https://api-cdn.rule34.xxx/images/4837/dd5d449937ffa1cc5a3b6ff58b9d0c9e.png
- https://api-cdn.rule34.xxx/images/4837/33252aa45951a3897151b0c4df230a5a.jpeg
- https://api-cdn.rule34.xxx/images/4837/06e6f538452e1bfabbacf273b7a58987.png
- https://api-cdn.rule34.xxx/images/4837/2766b6e899d557f723026c09186131f9.png
- https://api-cdn.rule34.xxx/images/4837/7da56095d9d546bfd7b312541d5a8315.png
- https://api-cdn.rule34.xxx/images/4837/e152571ef49834454d427e7e69be3b05.jpeg
- https://api-cdn.rule34.xxx/images/4837/acc3b301a3a54e67cd7b7069d3f12a02.png
File System hash
Sha1: 38c1e86cbb0c233cb7b69fee8e349f24895fa45a Sha256: 6ea285b06c606936277f7a7313fb74648043c53de6102c49fc5a3fb36cb47d6b
Tools Used:
- Detect it Easy
- JD-GUI
- Visual studio code
💬 Comment: