Jump to content
Aerosol

OphionLocker Analysis: Proof Anyone Really Can Write Malware

Recommended Posts

Posted

OphionLocker is supposedly the new ransomware on the block and is already being compared with sophisticated operations such as CryptoLocker and CryptoWall, so i decided to take a look and what I found is nothing short of hilarious.

ConsoleWindow.png

That's right, the ransomware is actually a console application, Instead of writing the Win32 application. The developer has opted to use a console application, which implies he is either writing command line tools (he's not), or that he has absolutely no damn idea what he's doing.

If there is even any shadow of doubt that this was written by a competent C++ developer, this should set the record straight:

H:\\ConsoleApplication1\\Release\\ConsoleApplication1.pdb

That's the PDB path of this application: "ConsoleApplicationX" is the name chosen by Visual Studio when automatically creating a new C++ console project, ConsoleApplication1 implies that this is the first Visual Studio project created; either the developer has just moved from another development environment, or more likely he's never coded C++ before.

HideWindow.png

This is a hack to make the console window invisible, as a result the console window will open and then disappear a second later when running the application.

Symbols.png

If you're new to programming, writing your own cryptographic library is obviously quite a challenge, as you can see he's opted to just use the Crypto++.

"But MalwareTech, even using a public cryptographic library, he'd need to know how to implement it."

Well if we look through the strings in the application, we find the following string: "ecies.private.key", which is the name of the file that the application uses to store the private key; this is consistent with the example ECIES (Elliptic Curve Integrated Encryption Scheme) code on the Crypto++ wiki.

ECIESExample.png

The C&C communicated mechanism is much of the same story, although it could have been implemented with a few lines of code using the WinInet library, the developer has opted to use the insanely bulky HTTP Client library WinHTTPClient, which uses the WinHTTP api (should only be used for service and not client applications).

Copy%26Pasta.png

Obviously, no application is complete without some error handling, so here's what happens if the locker fails to connect to the C&C.

AppCrash.png

Error handling is love, error handling is life.

GUI programming tends to be quite tricky, but it's nothing you cant achieve with a message box and 300 text files that all say the same thing.

Message.png

This is why we can't have nice things.

Conclusion

Q: Can you code functional ransomware with absolutely no programming experience whatsoever?

A: Yes.

SoDone.gif

OphionLocker

MD5: e17da8702b71dfb0ee94dbc9e22eed8d

SHA1: eb78b7079fabecbec01a23c006227246e78126ab

SHA256: c1a0173d2300cae92c06b1a8cb344cabe99cf4db56fa9dca93629101c59ce68f

Source

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...