HackTool.Win64.EDRSandBlast.THEOBBD
Trojan:Win32/Seheq!rfn (MICROSOFT)
Windows

恶意软件类型:
Hacking Tool
有(yǒu)破坏性?:
没有(yǒu)
加密?:
没有(yǒu)
In the Wild:
是的
概要
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
该恶意软件不具(jù)有(yǒu)任何传播例程。
该恶意软件不具(jù)有(yǒu)任何后门例程。
技(jì )术详细信息
新(xīn)病毒详细信息
它以文(wén)件的形式出现在系统中(zhōng),可(kě)能(néng)是其他(tā)恶意软件投放的,或者是用(yòng)户在访问恶意网站时无意中(zhōng)下载的。
传播
该恶意软件不具(jù)有(yǒu)任何传播例程。
后门例程
该恶意软件不具(jù)有(yǒu)任何后门例程。
其他(tā)详细信息
该程序执行以下操作(zuò):
- It monitors the activity of a process to detect EDR implementation and subsequently bypasses the detection mechanisms.
- It employs techniques utilized to bypass EDR detections both in user and kernel mode.
- It performs the following actions to bypass EDR detections:
- Kernel Notify Routines Callbacks Removal → by exploiting vulnerable EDR drivers
- Disable Object Callbacks → by either setting the Enabled flag in the callback structure, unlinking the Callbacklist of threads and process, or disabling object callbacks altogether
- Bypass Minifilters' Callbacks → by unlinking the nodes from their lists, making them temporarily invisible from the filter manager loaded by the EDR using Windows Filter Manager
- Disable ETW Microsoft-Windows-Threat-Intelligence Provider - by patching in kernel memory related to ETW TI
- Bypass Userland Hooking → by using unhooking, custom or EDR's own trampoline, duplicate DLL, or direct syscall methods
- Vulnerable Drivers Exploitation → by using vulnerable drivers to gain kernel read/write primitive
- Detect EDR drivers and processes → detects if a driver or process belongs to an EDR product. If an EDR driver or process is unknown, it embeds the information to the tool
- Bypass RunAsPPL → by elevating the protection level to dump the LSASS process memory
- Bypass Credential Guard → by patching and enabling Wdigest to show cleartext credentials in LSASS memory
- Offsets Retrieval → by utilizing hardcoded offsets instead of pattern searches to reliably perform kernel monitoring bypass operations
- It exploits vulnerabilities in the following known drivers:
- RTCore64.sys → CVE-2019-16098
- DBUtil_2_3.sys → CVE-2021-21551
- gdrv.sys
- It checks for the presence of the following files:
- {Malware Path}\gdrv.sys
- {Malware Path}\RTCore64.sys
- {Malware Path}\DBUtil_2_3.sys
- {Malware Path}\NtoskrnlOffsets.csv → contains offsets used to perform Offsets Retrieval
解决方案
Step 1
对于Windows ME和XP用(yòng)户,在扫描前,请确认已禁用(yòng)系统还原功能(néng),才可(kě)全面扫描计算机。
Step 2
注意:在此恶意软件/间谍软件/灰色软件执行期间,并非所有(yǒu)文(wén)件、文(wén)件夹和注册表键值和项都会安(ān)装(zhuāng)到您的计算机上。这可(kě)能(néng)是由于不完整的安(ān)装(zhuāng)或其他(tā)操作(zuò)系统条件所致。如果您没有(yǒu)找到相同的文(wén)件/文(wén)件夹/注册表信息,请继续进行下一步操作(zuò)。
Step 3
搜索和删除这些文(wén)件
- {Malware Path}\gdrv.sys
- {Malware Path}\RTCore64.sys
- {Malware Path}\DBUtil_2_3.sys
- {Malware Path}\NtoskrnlOffsets.csv
- {Malware Path}\gdrv.sys
- {Malware Path}\RTCore64.sys
- {Malware Path}\DBUtil_2_3.sys
- {Malware Path}\NtoskrnlOffsets.csv
Step 4
使用(yòng)亚信安(ān)全产(chǎn)品扫描计算机,并删除检测到的HackTool.Win64.EDRSandBlast.THEOBBD文(wén)件 如果检测到的文(wén)件已被亚信安(ān)全产(chǎn)品清除、删除或隔离,则无需采取进一步措施。可(kě)以选择直接删除隔离的文(wén)件。请参阅知识库页(yè)面了解详细信息。