![]() ![]() ![]() To find your vulnerable systems, in the Tenable.io Vulnerability Workbench, click on “Advanced” and do a search for Plugin Name contains “CCleaner”:įor any malware situation, you should always run a malware scan against your systems, using the predefined Malware Scan template. Tenable has released a set of plugins to help you determine if CCleaner is currently installed on your network and whether the installed versions have the backdoor: Plugin ID These generated domains are not under the control of the attacker and do not pose any risk currently. If the hardcoded IP address becomes unreachable, the malicious code uses a Domain Generation Algorithm (DGA) to redirect communication to a different location.Communicates with the remote IP to download a second stage payload.Sends the encoded information via an HTTPS POST request to the external IP address 216126225148 with a hardcoded HTTP Host Header of “ Host: ” to make the request look legitimate.Encrypts and encodes all the collected information using base64 with a custom alphabet.Creates the Windows registry key HKLM\SOFTWARE\Piriform\Agomo to store data about the host, including the name of the computer, a list of installed software including Windows updates, a list of running processes, the MAC addresses of the first three network adapters and additional information such as whether the process is running with administrator privileges, whether it is a 64-bit system and more.The code then performs the following actions: ![]() The modified code performs various tasks before the application’s code is executed, including unpacking and decrypting shellcode. The code modification is hidden in CCleaner’s initialization code known as CRT (Common Runtime) that is usually inserted at compilation time. Vulnerability detailsĪ malicious modification of the 32-bit CCleaner.exe binary (CCleaner version and CCleaner Cloud version ) contains a two-stage backdoor that allows a remote attacker to execute code on an affected system. This could allow a remote attacker to extract sensitive data from the host, or execute malicious code on the host. C6393C2ABEA0C3EDA4771729D092ED013EF8AD88 29-Apr-20 8:24:11 PMĢ9-Apr-20 8:46:42 PM Real-time file system protection file D:\Spartan\Downloads\ccsetup566\CCleaner64.exe Suspicious Object cleaned by deleting INVADER\Spartan Event occurred on a new file created by the application: C:\Program Files\WinRAR\WinRAR.exe (31A63BAA82AF84E99EC8433766D045E7B7B705AD).CCleaner, a popular application used for performing routine maintenance on systems, was recently found to contain a malicious backdoor. 4627B9C1B8CC3218121CB358042D35B74B7D496E 18-Apr-20 2:54:25 AMĢ9-Apr-20 8:46:42 PM Real-time file system protection file D:\Spartan\Downloads\ccsetup566\CCleaner.exe Suspicious Object cleaned by deleting INVADER\Spartan Event occurred on a new file created by the application: C:\Program Files\WinRAR\WinRAR.exe (31A63BAA82AF84E99EC8433766D045E7B7B705AD). Time Scanner Object type Object Detection Action User Information Hash First seen hereĢ9-Apr-20 8:39:25 PM Real-time file system protection file D:\Software\CCleaner\CCleaner64.exe Suspicious Object cleaned by deleting INVADER\Spartan Event occurred during an attempt to access the file by the application: C:\Windows\explorer.exe (C8F083E4B6C60F7BB30F123DDA1ADC30B821F982). I submitted this to ESET as a false positive. This is the first time ESET detects CCleaner as malware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |