Image courtesy of Palo Alto |
This latest version integrates novel obfuscation techniques and exhibits distinct post-infection activities not seen in previous variants (RomCom 3.0 and PEAPOD/RomCom 4.0).
Key Points:
RecentDocs
registry key. It also employs window message-based control flow obfuscation.explorer.exe
using COM hijacking. Specifically, it registers the malicious DLL (keyprov.dll
) as a thumbnail cache library in the registry (HKCU\SOFTWARE\Classes\CLSID
).single.dll
, listens on port 1342 for commands such as deleting registry keys, executing stored DLL payloads, and initiating further updates.HKCU\SOFTWARE\AppDataSoft\Software
) to store encrypted payloads and keep track of updates.xeontime[.]com
) to download payloads. Encrypts strings, including the C2 domain and API function names, to evade detection.Click to Open Code Editor