UnpacMe Weekly: Search Everything

This week we've introduced the ability to search for samples using ascii, wide, and hex-encoded strings. Quickly find related samples, and test pattern uniqueness without running a full Yara scan.

UnpacMe Weekly: Search Everything

Highlights

  • Added new search types for strings (ascii, wide, hex).
  • Upgrade to Capa to v5.1.0
  • Added new search type for Capa feature hashes.
  • Added coverage for Cryptnet Ransomware.
  • Added coverage for Domino Backdoor.

New Features

We've added a couple new search options that we have been testing with our internal workflows and found helpful when triaging new samples and searching for related samples.

As we've found it has helped our internal workflows, we wanted to open up the new search options to users. If you run into issues or notice any bugs, please let us know as we are still tuning how these new search options work.

This week we've introduced the ability to search for samples using ascii, wide, and hex-encoded strings. Allowing users to quickly find related samples, and test pattern uniqueness when analyzing a malware family or creating new rules for malware identification - all without having to initially run a full Yara scan! The new string searches use one of the following prefixes:

  • string.ascii
  • string.wide
  • string.hex

Ascii & Wide String Search

Both ascii and wide string search use quoted strings. In the example search shown below, the search term "C:\Program Files\Common Files\scvh0st.exe" (note the misspelled scvh0st) exists within several samples of a Gh0stRAT variant.

Example of Ascii String Search

Hex Search

Hex search supports searching binary data using hex encoded strings. Wildcarding is also supported for both nibble and byte based wild cards such as {12 34 5? 78} and {9a bc ?? f0}. This allows users to quickly search for related samples - wildcarding bytes that are likely to change.

An example of a hex string search is shown below which is found in samples of IcedIDLoader

Example of Hex Encoded String search

Capa Feature Hash

Another feature we've begun testing is using a simple hash of the enumerated Capa features for a sample. This allows users to quickly search for samples which contain similar features identified by Capa. You can search for related samples using the search prefix capa.featureshash. The feature hash is listed under the file hashes section for a sample as shown below.

Searching using the hash 0x9240462 from the example above results in several related SystemBC samples.

Example Search Using the Capa Feature Hash

Looking at the top submitted samples for the past week shows an almost even distribution between Downloaders, InfoStealers and RATs. Similar to last week we've observed Amadey, AgentTesla, SmokeLoader, and FormBook as being the most submitted malware families.

One change this week that we noted was the increase in AgentTesla samples. We believe this is related to changes we've made to identify samples which leverage XorStringsNET a tool which Xor encrypts strings of .Net executables. We've found that several low-tier operators have leveraged the tool to encrypt strings in their .Net payloads including numerous samples of AgentTesla.

Last Week's Top User Submitted Threats

Threat Coverage

We've added and improved coverage for the following malware families.

Malware Configuration Extractors

This week we've added or improved coverage for the following malware families.

  • Domino Backdoor - We've added a new configuration extractor for Domino which extracts the C2 addresses and the RSA public key within the sample.

As always, if you have any feedback or issues please let us know.

Happy Unpacking!