MUMU emulator is a Trojan horse Malicious

  MUMU emulator is a Trojan horse Malicious

Trojan.Shlem.ea
Trojan.Shlem.ea

Trojan.Shlem.ea

In fact, it’s a very impressive program in terms of performance, and it’s free.
I used it, but wondered why it’s free.
I then did some research, using virustotal and some other sites.
I did a lot of research.
I found that the program is malicious and uses hidden methods to steal information, making it difficult to detect.
I followed the graphics and the process from the beginning and found:

A Network Trojan was detected
Potential Corporate Privacy Violation
Detects a driver load from a temporary directory
Detects the load of a signed WinRing0 driver often used by threat actors, crypto miners (XMRIG) or malware for privilege escalation
Detect the creation of a service with a service binary located in a suspicious directory
Trojan.Shlem.ea
NemuDownloader.exe
HyperVChecker.exe

Matches rule Driver Load From A Temporary Directory by Florian Roth (Nextron Systems) at Sigma Integrated Rule Set (GitHub) Detects a driver load from a temporary directory atches rule Vulnerable WinRing0 Driver Load by Florian Roth (Nextron Systems) at Sigma Integrated Rule Set (GitHub) Detects the load of a signed WinRing0 driver often used by threat actors, crypto miners (XMRIG) or malware for privilege escalation Matches rule Service Binary in Suspicious Folder by Florian Roth (Nextron Systems), frack113 at Sigma Integrated Rule Set (GitHub) Detect the creation of a service with a service binary located in a suspicious directory

 

Service Binary in Suspicious Folder Detect the creation of a service with a service binary located in a suspicious directory Sigma Integrated Rule Set (GitHub) – Florian Roth (Nextron Systems), frack113 Context for the matching events RuleName:T1031,T1050 EventID:13 EventType:SetValue Image:C:\Windows\system32\services.exe Details:\??\C:\Users\azure\AppData\Local\Temp\7z3B62181C\WinRing0x64.sys TargetObject:HKLM\System\CurrentControlSet\services\WinRing0_1_2_0\ImagePath EventID:13 EventType:SetValue Image:C:\Windows\system32\services.exe Details:\??\C:\Users\Bruno\AppData\Local\Temp\7z147AFBD0\WinRing0x64.sys TargetObject:HKLM\System\CurrentControlSet\Services\WinRing0_1_2_0\ImagePath EventID:13 Details:\??\%USERPROFILE%\AppData\Local\Temp\7z0DED2370\WinRing0x64.sys EventType:SetValue TargetObject:HKLM\System\CurrentControlSet\Services\WinRing0_1_2_0\ImagePath

 

title: Driver Load From A Temporary Directory
id: 2c4523d5-d481-4ed0-8ec3-7fbf0cb41a75
status: test
description: Detects a driver load from a temporary directory
references:
– Internal Research
author: Florian Roth (Nextron Systems)
date: 2017-02-12
modified: 2021-11-27
tags:
– attack.persistence
– attack.privilege-escalation
– attack.t1543.003
logsource:
category: driver_load
product: windows
detection:
selection:
ImageLoaded|contains: ‘Temp’
condition: selection
falsepositives:
– There is a relevant set of false positives depending on applications in the environment

level: high

bidevazomu.com
9C10.tmp
biggestblazer.com

full report https://app.any.run/tasks/dd4f9986-90d6-4b1f-9287-72543e5518d6

source website info :

موضوعات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *