Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add multiple new DLLs and new vendors #76

Merged
merged 29 commits into from
May 14, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
d6a1c39
ASUS vulnerable atkexComSvc.exe commit
JPMinty Apr 10, 2024
019fa57
Commit Asus, GloryLogic and Cisco
JPMinty Apr 10, 2024
37ce6f7
Fixes for type and author fields
JPMinty Apr 10, 2024
ee75505
Update wcldll.yml
JPMinty Apr 10, 2024
2a8fd49
Update badata_x64.yml
JPMinty Apr 10, 2024
8a5fc2e
Update badata_x64.yml
JPMinty Apr 10, 2024
9e80670
Update wcldll.yml
JPMinty Apr 10, 2024
ba72840
Minor fixes
wietze Apr 12, 2024
2412a36
Minor fixes
wietze Apr 12, 2024
ca652a8
Update 11 DLLs actively used maliciously ITW
JPMinty Apr 16, 2024
281ee0f
Merge branch 'wietze:main' into main
JPMinty Apr 16, 2024
6d62162
Minor changes
wietze Apr 27, 2024
f55959e
Schema adjustments
wietze Apr 27, 2024
4ce3d83
Adding 'company' field to previous Huntress entries
wietze Apr 27, 2024
e130b7f
Add register and ci DLLs
JPMinty May 6, 2024
6853052
Merge branch 'wietze:main' into main
JPMinty May 6, 2024
9f418a9
Update ci.yml
JPMinty May 6, 2024
c382739
Remove expected signature info from register
JPMinty May 6, 2024
f3ca67e
Add sqlite.dll used by networx
JPMinty May 6, 2024
1829996
Additional entry for vulnerable ICQLite binary
JPMinty May 6, 2024
4743160
Create avdevice-54.yml
JPMinty May 6, 2024
06ce20f
Create python310.yml
JPMinty May 8, 2024
1a357b1
Create libXfont-1.yml
JPMinty May 9, 2024
65d9d02
Rename libXfont-1.yml to libxfont-1.yml
JPMinty May 9, 2024
0bd7985
temp change so folder can be made lowercase
JPMinty May 9, 2024
72490f2
Merge branch 'main' of https://github.com/JPMinty/HijackLibs
JPMinty May 9, 2024
4281a2d
lowercase folder commit
JPMinty May 9, 2024
4a84f21
Update libxfont-1.yml
JPMinty May 9, 2024
f0d5a41
Minor fixes
wietze May 14, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
23 changes: 23 additions & 0 deletions yml/3rd_party/anymp4/avdevice-54.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---
Name: avdevice-54.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: AnyMP4
ExpectedLocations:
- '%PROGRAMFILES%\AnyMP4 Studio\AnyMP4 Blu-ray Creator'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\AnyMP4 Studio\AnyMP4 Blu-ray Creator\AnyMP4 Blu-ray Creator.exe'
Type: Sideloading
ExpectedVersionInformation:
- OriginalFilename: AnyMP4 Blu-ray Creator.exe
InternalName: AnyMP4 Blu-ray Creator
FileDescription: AnyMP4 Blu-ray Creator
SHA256:
- '98c9c45cf18434fe9ab79c9db2e88c1f1db48c95338864421e4d761d71c2fbc6'
Acknowledgements:
- Name: Chad Hudson
Company: Huntress
Twitter: '@0xBurgers'
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
22 changes: 22 additions & 0 deletions yml/3rd_party/digiarty/ci.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
---
Name: ci.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: Digiarty
ExpectedLocations:
- '%PROGRAMFILES%\Digiarty\WinX Blu-ray Decrypter'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\Digiarty\WinX Blu-ray Decrypter\WinX Blu-ray Decrypter.exe'
Type: Sideloading
ExpectedVersionInformation:
- FileDescription: WinX Blu-ray Decrypter
SHA256:
- '1fd92aa46464f8453e33dc7461f80ee7b441f9042e9d0110086226c5f725bd9f'
Resources:
- https://www.virustotal.com/gui/file/2560b7390da7c7a1d92050d9c1f5e3a8025cd35fff5360fe73583b5e3f48731e
- https://www.virustotal.com/gui/file/ae2453d0e03d72759d5239dcfe9518d6a721319006613a41f8bb53d37d4d1391/details
- https://www.virustotal.com/gui/file/7306316b53f915aaff06f00896829884db857b7e5c2747188ae080cad5b8c0e1
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
25 changes: 25 additions & 0 deletions yml/3rd_party/icq/liteskinutils.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
---
Name: liteskinutils.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: ICQ
ExpectedLocations:
- '%PROGRAMFILES%\ICQLite'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\ICQLite\ICQLite.exe'
Type: Sideloading
ExpectedVersionInformation:
- OriginalFilename: ICQLite.exe
InternalName: ICQ Lite
FileDescription: ICQLite
SHA256:
- 'e6baea057b35e495a3fc3cdf3b95d503c3abc63c371fbb0067f1052798ce3601'
Resources:
- https://www.virustotal.com/gui/file/e5e53392b29b74545e463b65052e0b6b07e8299d709f07501fb0f31b97a679ab/details
- https://www.virustotal.com/gui/file/a278d5604a93e93a5580845da93af6c316a37a4cd35c1fc9348958ae1bebdb90/details
- https://www.virustotal.com/gui/file/104ca4690b0ff17eb55e1330c5baf5580a731b6834f0716c483e646d6030855c/relations
- https://www.virustotal.com/gui/file/010f55aef8ccba2ea1307d934decd577a08fa21547d1db30e01f3ae5ff1cce07/relations
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
25 changes: 25 additions & 0 deletions yml/3rd_party/icq/skinutils.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
---
Name: skinutils.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: ICQ
ExpectedLocations:
- '%PROGRAMFILES%\ICQLite'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\ICQLite\ICQLite.exe'
Type: Sideloading
ExpectedVersionInformation:
- OriginalFilename: ICQLite.exe
InternalName: ICQ Lite
FileDescription: ICQLite
SHA256:
- 'e6baea057b35e495a3fc3cdf3b95d503c3abc63c371fbb0067f1052798ce3601'
Resources:
- https://www.virustotal.com/gui/file/e5e53392b29b74545e463b65052e0b6b07e8299d709f07501fb0f31b97a679ab/details
- https://www.virustotal.com/gui/file/a278d5604a93e93a5580845da93af6c316a37a4cd35c1fc9348958ae1bebdb90/details
- https://www.virustotal.com/gui/file/104ca4690b0ff17eb55e1330c5baf5580a731b6834f0716c483e646d6030855c/relations
- https://www.virustotal.com/gui/file/010f55aef8ccba2ea1307d934decd577a08fa21547d1db30e01f3ae5ff1cce07/relations
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
23 changes: 23 additions & 0 deletions yml/3rd_party/iobit/register.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---
Name: register.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: IObit
ExpectedLocations:
- '%PROGRAMFILES%\IObit\Driver Booster\%VERSION%'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\IObit\Driver Booster\%VERSION%\DriverBooster.exe'
Type: Sideloading
ExpectedVersionInformation:
- OriginalFilename: RttHlp.exe
InternalName: RttHlp.exe
FileDescription: IObit RttHlp
SHA256:
- '8aed681ad8d660257c10d2f0e85ae673184055a341901643f27afc38e5ef8473'
Resources:
- https://www.virustotal.com/gui/file/0500e5ad7e344d32ee26da988aeb30f6344a0c89a68eacce5d6a5683d1fee0e1/relations
- https://www.virustotal.com/gui/file/cdfe0f80cd3dc1914c7ad1a6305c0c1116168a37c5cfe8ff51650e2ac814b818/details
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
27 changes: 27 additions & 0 deletions yml/3rd_party/mobatek/libxfont-1.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
Name: libxfont-1.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-10
Vendor: Mobatek
ExpectedLocations:
- '%PROGRAMFILES%\Mobatek\MobaXterm Personal Edition'
- '%PROGRAMFILES%\Mobatek\MobaXterm'
ExpectedSignatureInformation:
- Subject: C=FR, PostalCode=31830, S=Midi-Pyrénées, L=Plaisance du Touch, STREET=13 rue Paul Bernadot, O=Mobatek, CN=Mobatek
Issuer: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Code Signing CA
Type: Authenticode
VulnerableExecutables:
- Path: '%PROGRAMFILES%\Mobatek\MobaXterm Personal Edition\MobaXterm.exe'
Type: Sideloading
SHA256:
- '35132e05638b942403b8a813925de7b54e2e2e35b6ba7a8a081e8b96edd4c0aa'
- Path: '%PROGRAMFILES%\Mobatek\MobaXterm\MobaXterm.exe'
Type: Sideloading
SHA256:
- '35132e05638b942403b8a813925de7b54e2e2e35b6ba7a8a081e8b96edd4c0aa'
Resources:
- https://www.virustotal.com/gui/file/b99bd7ffb7634749487570d0b3a7e423047de4ab13a10c2d912660aec322618e/details
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
21 changes: 21 additions & 0 deletions yml/3rd_party/python/python310.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
Name: python310.dll
Author: Jai Minton
Created: 2024-05-08
Vendor: Python
ExpectedLocations:
- '%PROGRAMFILES%\Python310'
- '%LOCALAPPDATA%\Temp\%VERSION%'
- '%PROGRAMFILES%\DWAgent\runtime'
- '%USERPROFILE%\anaconda3'
VulnerableExecutables:
- Path: 'pythonw.exe'
Type: Sideloading
- Path: 'dwagent.exe'
Type: Sideloading
Resources:
- https://www.virustotal.com/gui/file/115fba7a9ea7d2e38d042c7fa5f81209e0d712c107ceb2eafe2f27f94c8f6054/details
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
21 changes: 21 additions & 0 deletions yml/3rd_party/softperfect/sqlite.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
Name: sqlite.dll
Author: Jai Minton - HuntressLabs
Created: 2024-05-06
Vendor: SoftPerfect
ExpectedLocations:
- '%PROGRAMFILES%\NetWorx'
VulnerableExecutables:
- Path: '%PROGRAMFILES%\NetWorx\networx.exe'
Type: Sideloading
ExpectedVersionInformation:
- FileDescription: NetWorx Application (64-bit)
SHA256:
- '29345d9c6ff0106c9032b15e2c88f17bc8972ed843d1b5c044cf17d00f1d45c5'
Resources:
- https://www.virustotal.com/gui/file/0271e401ca9e430868f45148a04680295929450aecc537285359a28605645daf
- https://www.virustotal.com/gui/file/4489bffe08dcbd1e9741f9b66f8ba10b7526318a1dc8d190aef13bbc1599b0f7/details
Acknowledgements:
- Name: Jai Minton
Company: Huntress
Twitter: '@cyberrraiju'
1 change: 0 additions & 1 deletion yml/3rd_party/trendmicro/tmtap.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,3 @@ VulnerableExecutables:

Resources:
- https://medium.com/@infiniti_css/trend-micro-password-manager-dll-hijack-fa839acaad59

Loading