Hunting Zoom-Related Malware
This tutorial will focus on how to use PolySwarm to hunt for Windows samples that potentially related to Zoom.
TrendMicro recently published a blog post on some malware exploiting the rise in Zoom popularity.
After review the article, this malware:
- is a Powershell script,
- that embeds a 7zip extractor, and
- 7zip-compressed Tor, coinminer (the actual malware) and (legitimate) Zoom installers
The malware will cause the victim machine to mine cryptocurrency if the infected computer is powerful enough (notably, has a discrete GPU) over Tor.
TrendMicro published a handful of IOCs, including a C2 URL: https://2no.co/1O5aW
.
Use Metadata search to find Artifacts that contain this URL:
- via the CLI:
polyswarm search metadata 'strings.urls:*2no.co*1O5aW'
- via the Python library:
query = 'strings.urls:*2no.co*1O5aW'
results = api.search_by_metadata(query)
for result in results:
print(f"Artifact Attributes: {result.artifact}")
We get 1 result, which was not part of the IOCs published by TrendMicro, but is clearly a PowerShell script exactly as described in their blog!