{"id":575,"date":"2013-11-18T02:11:03","date_gmt":"2013-11-18T02:11:03","guid":{"rendered":"http:\/\/www.gironsec.com\/blog\/?p=575"},"modified":"2013-11-18T02:25:18","modified_gmt":"2013-11-18T02:25:18","slug":"typical-malware-on-a-typical-day","status":"publish","type":"post","link":"https:\/\/www.gironsec.com\/blog\/2013\/11\/typical-malware-on-a-typical-day\/","title":{"rendered":"Typical Malware On A Typical Day"},"content":{"rendered":"<p>Hello again fellow readers and security enthusiasts. <\/p>\n<p>The last post was filler and I&#8217;m sorry for that. Today we&#8217;re going to go over some typical malware, start to finish. Exploit to C&#038;C communication.<\/p>\n<p>We start with our exploit file. Java of course. Most of the time when I encounter a java file, it&#8217;s heavily obfuscated and uses <a href=\"http:\/\/java.dzone.com\/articles\/neater-way-use-reflection-java\">reflection<\/a> to bypass Anti-Virus &#038; IDS systems. This is a rare exception &#8211; no reflection or obfuscation. Maybe the guy delivering it didn&#8217;t know?<br \/>\nIn case you don&#8217;t know, here is what a typical piece of obfuscated \/ reflection based java code looks like:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/typical_jar_sploit.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/typical_jar_sploit-300x297.png\" alt=\"typical_jar_sploit\" width=\"300\" height=\"297\" class=\"alignnone size-medium wp-image-581\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/typical_jar_sploit-300x297.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/typical_jar_sploit-150x150.png 150w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/typical_jar_sploit.png 903w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>As you can see, I usually have to fart around with a eclipse to get an idea of what&#8217;s going on, but not this time:<\/p>\n<p><a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile2.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile2-300x181.png\" alt=\"jarfile2\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-578\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile2-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile2-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nIn this case, the item being exploited is apparent. The <a href=\"http:\/\/www.oracle.com\/technetwork\/topics\/security\/alert-cve-2013-0422-1896849.html\">SecurityManager<\/a> vulnerability.<\/p>\n<p>The other class is of more interest:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile1.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile1-300x181.png\" alt=\"jarfile1\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-577\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile1-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile1-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jarfile1.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>How nice of them to leave the link to the binary in the open as well as the means to reach it (user agent strings).<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jar3.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jar3-300x188.png\" alt=\"jar3\" width=\"300\" height=\"188\" class=\"alignnone size-medium wp-image-579\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jar3-300x188.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/jar3.png 675w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nThe program downloads the file into the machine&#8217;s temp folder and executes it.<\/p>\n<p>So let&#8217;s take a look at the file:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/bin0.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/bin0-300x181.png\" alt=\"bin0\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-585\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/bin0-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/bin0-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/bin0.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Typical memory packed exe colluding with a <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms682425%28v=vs.85%29.aspx\">CreateProcess()<\/a> call right after unpacking itself.<\/p>\n<p>By the looks of the thing, its an MFC app.<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/justaguess.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/justaguess-300x181.png\" alt=\"justaguess\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-586\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/justaguess-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/justaguess-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/justaguess.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Since its MFC, that means when we debug the thing, we have to step into the higher addresses to progress through the app and find the entry point:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/entry-point.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/entry-point-300x171.png\" alt=\"entry point\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-587\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/entry-point-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/entry-point-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/entry-point.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>If you&#8217;re lazy \/ smart, you&#8217;ll set break points on the interesting functions we saw in IDA:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest-300x181.png\" alt=\"interest\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-588\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest2.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest2-300x171.png\" alt=\"interest2\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-589\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest2-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest2-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/interest2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nThis skips the BS of having to step through MFC classes and other non sense. <\/p>\n<p>Running the app to this breakpoint, we make a revelation:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/whatsthis.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/whatsthis-300x171.png\" alt=\"whatsthis\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-590\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/whatsthis-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/whatsthis-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/whatsthis.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nWhat the hell is &#8216;wuauclt&#8217; ? <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc720477%28v=ws.10%29.aspx\">Windows updates!<\/a><\/p>\n<p>Let&#8217;s run the app some more and see what happens.<\/p>\n<p><a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc-300x171.png\" alt=\"wauc\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-591\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>By the looks of it, its referencing that wuauclt utility, but its in the wrong place. Its <i>supposed<\/i> to be in the system32 folder. But instead its in another folder in %appdata%.<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc2.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc2-300x171.png\" alt=\"wauc2\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-592\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc2-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc2-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Stepping through a few more procedures we see the following:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc3.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc3-300x171.png\" alt=\"wauc3\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-593\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc3-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc3-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wauc3.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Seems pretty cut and dry now. The malware is launching an alternative version of windows update. <\/p>\n<p>Comparing the malware&#8217;s version of &#8216;wuauclt&#8217; with the unchanged version we see they are very different both in size and contents:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/compare.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/compare-300x216.png\" alt=\"compare\" width=\"300\" height=\"216\" class=\"alignnone size-medium wp-image-594\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/compare-300x216.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/compare.png 1022w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The MD5&#8217;s check out as being non malicious on VirusTotal. I think the spawned \/ dropped version of Windows Update is fine. Here&#8217;s where shit gets weird. There were 2 other files in the wuauclt directory in the user appdata folder. &#8216;wuauclt.dat&#8217; and &#8216;clbcatq.dll&#8217;. The dat file doesn&#8217;t contain anything recognizable as it may just be encoded \/ encrypted, but the &#8216;clbcatq.dll&#8217; file is what&#8217;s interesting. This file contains the goodies. <\/p>\n<p>Peeking inside the DLL file we see calls known for VirtualAlloc, VirtualProtect, and Sleep().<\/p>\n<p><a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-300x181.png\" alt=\"dll file\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-597\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Sleep for 1000 hours? Weird. <\/p>\n<p>There&#8217;s another sleep call more in context with the appdata folder. A shorter sleep &#8211; only 5.5 hours.<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-2.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-2-300x181.png\" alt=\"dll file 2\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-598\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-2-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-2-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Assuming we wait the 5.5 hours for the dll code to do its thang, we are then taken to the following code, our all too familiar VirtualProtect \/ VirtualQuery calls responsible usually for unpacking of memory packed data by setting sections of memory as readable \/ writable \/ executable:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-3.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-3-300x181.png\" alt=\"dll file 3\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-600\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-3-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-3-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-file-3.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>How can I prove this? I&#8217;ll have to edit the dll binary&#8217;s exe code so that I don&#8217;t have to wait 5.5 hours. A hex editor can be used for this, but I prefer to use Immunity for this:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit-300x171.png\" alt=\"dll edit\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-602\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nSyncing up data structures in hex editors, alignment, and all that BS sucks. When I patch ELF binaries, I have to use a hex editor. On Windows, life is slightly easier.<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit2.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit2-300x171.png\" alt=\"dll edit2\" width=\"300\" height=\"171\" class=\"alignnone size-medium wp-image-603\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit2-300x171.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit2-1024x584.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/dll-edit2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Now we merely replace the dll file, launch the program, and start listening for that C&#038;C traffic. That was fun!<\/p>\n<p>Now for crazy speculation and theories:<br \/>\nI think the windows update manager stored within the pulled down malware isn&#8217;t actually malware, instead it contains a broken call to <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms684175%28v=vs.85%29.aspx\">LoadLibrary<\/a> which allows a program to invoke a dll of their choosing to be run in the context of the new windows update exe program. Sound far fetched? Check this:<br \/>\n<a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/loadlib_maybe.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/loadlib_maybe-300x181.png\" alt=\"loadlib_maybe\" width=\"300\" height=\"181\" class=\"alignnone size-medium wp-image-596\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/loadlib_maybe-300x181.png 300w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/loadlib_maybe-1024x618.png 1024w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/loadlib_maybe.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\nThe wuauclt.exe file has a special loadlibrary function. Then one of the strings in the binary pulled down from the malware site was &#8216;\/ShowWU&#8217;, one of the <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc720477%28v=ws.10%29.aspx\">command line argument switches<\/a> for &#8216;wuauclt.exe&#8217;. Maybe this switch holds some significance with the rogue dll? <\/p>\n<p>Just an idea. Just a typical day. <\/p>\n<p>With these details alone, I was able to determine the good guys at sophos had already done <a href=\"https:\/\/secure2.sophos.com\/en-us\/threat-center\/threat-analyses\/viruses-and-spyware\/Mal~Agent-AGI\/detailed-analysis.aspx\">the same work<\/a> for me. Thanks guys.<\/p>\n<p>If you want to play around with the files, I&#8217;ve included the IDB files, patched and unpatched binaries <a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/wuauclt.7z\">here<\/a> for study (pass is &#8216;infected&#8217;).<\/p>\n<p><a href=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/SRFnU.png\"><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/SRFnU.png\" alt=\"SRFnU\" width=\"774\" height=\"338\" class=\"alignnone size-full wp-image-601\" srcset=\"https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/SRFnU.png 774w, https:\/\/www.gironsec.com\/blog\/wp-content\/uploads\/2013\/11\/SRFnU-300x131.png 300w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello again fellow readers and security enthusiasts. The last post was filler and I&#8217;m sorry for that. Today we&#8217;re going to go over some typical malware, start to finish. Exploit to C&#038;C communication. We start with our exploit file. Java of course. Most of the time when I encounter a java file, it&#8217;s heavily obfuscated [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,7],"tags":[105,72,9,48,50,73],"_links":{"self":[{"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/posts\/575"}],"collection":[{"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":13,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":612,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions\/612"}],"wp:attachment":[{"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gironsec.com\/blog\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}