SeizetheBlog CTI/DFIR/MA and other assorted things

Malware Analysis Practice (Exe 3)

Analysis of helium-ack-golf-friend

helium-ack-golf-friend is a sample I downloaded from MalwareBazaar that was uploaded by @teamffowlaw2, a link to the sample is below.

Sample source: https://bazaar.abuse.ch/sample/01e38278ae884c2ebacd3b4ca31e17aa55eb7385b6f23b623d9885ee9bce23e8/


Static Analysis

File Hashes

I pulled the below hashes using hashcalc.

  • MD5: e332b4d019590be2329fd2baf39ae919
  • SHA1: 87101ac19007b7c05033694151a28a1560312881
  • SHA256: 01e38278ae884c2ebacd3b4ca31e17aa55eb7385b6f23b623d9885ee9bce23e8

VirusTotal

Of the samples I have looked at so far this is detected by AV the most with 51/66 vendors flagging it as malicious.

Hopefully this indicates that there are no anti-analysis techniques used and it is a straightforward sample to analyse. There is a lot to go through here but i’d like to go into my manual anaysis blind so lets move on.

VirusTotal - https://www.virustotal.com/gui/file/01e38278ae884c2ebacd3b4ca31e17aa55eb7385b6f23b623d9885ee9bce23e8

Strings

I used floss to pull the strings from this sample.

There is very little here aside from an xml manifest and some Windows dll files. Given the lack of intersting strings I suspect this sample is packed, so much for being easy.

PEStudio

As soon as I load the sample into PEStudio the signature ‘Enigma Protector’ jumps out.

pestudio screenshot