2020-02-08 16:30:27 +00:00
# Neutrino physics 101
## Table of Contents
* [Malware analysis ](#Malware-analysis )
+ [The initial vector ](#Initial )
+ [Loader ](#loader )
* [Threat Intelligence ](#Intel )
+ [](#Sub_Intel)
* [Cyber kill chain ](#Cyber-kill-chain )
* [Indicators Of Compromise (IOC) ](#IOC )
* [Yara Rules ](#Yara )
* [References MITRE ATT&CK Matrix ](#Ref-MITRE-ATTACK )
* [Links ](#Links )
+ [Original Tweet ](#tweet )
+ [Link Anyrun ](#Links-Anyrun )
+ [Ressources ](#Ressources )
< h2 > Malware analysis < a name = "Malware-analysis" > < / a > < / h2 >
< h3 > The initial vector< a name = "Initial" > < / a > < / h3 >
2020-02-08 23:49:37 +00:00
< h6 > The initial vector is an malicious document using a macro. As the first look, we can note some constant variables can be replace and deletefor improvement the reading of the code.< / h6 >
``` VBA
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHOneMask = 16515072
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHTwoMask = 258048
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHThreeMask = 4032
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHFourMask = 63
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHighMask = 16711680
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHMidMask = 65280
Private Const HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHLowMask = 255
Private Const MNAJSAQQQQQQ18 = 262144
Private Const MNAJSAQQQQQQ12 = 4096
Private Const MNAJSAQQQQQQ6 = 64
Private Const MNAJSAQQQQQQ8 = 256
Private Const MNAJSAQQQQQQ16 = 65536
```
< h6 > We can see the both functions for auto-open the macro in the reading of the document for the Word and Excel document. This is for a common code for the both vectors or for reduce the rate of the detection, hard to say it.< / h6 >
``` VBA
Sub AutoOpen()
AddSpace
End Sub
Private Sub Workbook_Open()
AddSpace
End Sub
```
< / li >
2020-02-08 16:30:27 +00:00
< p align = "center" >
< img src = "" >
< / p >
< p align = "center" >
< h2 > Threat Intelligence< / h2 > < a name = "Intel" > < / a > < / h2 >
< h2 > Cyber kill chain < a name = "Cyber-kill-chain" > < / a > < / h2 >
< h6 > The process graph resume cyber kill chains used by the attacker :< / h6 >
< p align = "center" >
2020-02-08 16:34:03 +00:00
< img src = "https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Additional%20Analysis/Neutrino/Pictures/cyberkill.PNG" >
2020-02-08 16:30:27 +00:00
< / p >
< h2 > Indicators Of Compromise (IOC) < a name = "IOC" > < / a > < / h2 >
< h6 > List of all the Indicators Of Compromise (IOC)< / h6 >
|Indicator|Description|
| ------------- |:-------------:|
< h6 > The IOC can be exported in < a href = "" > JSON< / a > < / h6 >
< h2 > References MITRE ATT& CK Matrix < a name = "Ref-MITRE-ATTACK" > < / a > < / h2 >
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
2020-02-08 16:34:03 +00:00
< h6 > This can be exported as JSON format < a href = "" > < / a > < / h6 >
2020-02-08 16:30:27 +00:00
< h2 > Yara Rules< a name = "Yara" > < / a > < / h2 >
< h6 > YARA Rules are available < a href = "" > here< / a > < / h6 >
< h2 > Links < a name = "Links" > < / a > < / h2 >
< h6 > Original tweet: < / h6 > < a name = "tweet" > < / a >
* [https://twitter.com/JAMESWT_MHT/status/1225796259845414912 ](https://twitter.com/JAMESWT_MHT/status/1225796259845414912 )
< h6 > Links Anyrun: < a name = "Links-Anyrun" > < / a > < / h6 >
* [impor.doc ](https://app.any.run/tasks/454fe6a2-e2d0-4fa3-ba1d-78e2c7372ddd )
< h6 > Resources : < / h6 > < a name = "Ressources" > < / a >
2020-02-08 23:50:11 +00:00
2020-02-08 23:49:37 +00:00
* [Encode64 / Decode64 in VB.NET ](https://stackoverflow.com/questions/12879661/encode64-decode64-in-vb-net )
* [New Neutrino Bot comes in a protective loader ](https://blog.malwarebytes.com/threat-analysis/2017/02/new-neutrino-bot-comes-in-a-protective-loader/ )
2020-02-08 16:30:27 +00:00
* [URLhaus Neutrino ](https://urlhaus.abuse.ch/browse/tag/Neutrino/ )
* [VB2019 paper: Rich Headers: leveraging this mysterious artifact of the PE format ](https://www.virusbulletin.com/virusbulletin/2020/01/vb2019-paper-rich-headers-leveraging-mysterious-artifact-pe-format/ )