{"id":89223,"date":"2020-06-22T18:00:19","date_gmt":"2020-06-22T12:30:19","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=89223"},"modified":"2020-06-22T19:50:05","modified_gmt":"2020-06-22T14:20:05","slug":"poulight-info-stealer-might-teaching-play-minecraft","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/poulight-info-stealer-might-teaching-play-minecraft\/","title":{"rendered":"Poulight- An info-stealing trojan might be teaching you how to play Minecraft"},"content":{"rendered":"<p>Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was sold in just a handful of dollars so that it was easily accessible to cybercriminals. Their website \u2018poullight[.]ru\u2019 called it \u2018Poulight Stealer\u2019 and boasted it as the best product on the internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89225 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/Plolight-pic-1.png\" alt=\"\" width=\"449\" height=\"168\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/Plolight-pic-1.png 449w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/Plolight-pic-1-300x112.png 300w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig1: Official Website of Poulight Stealer<\/h6>\n<p><strong>Technical Analysis:<\/strong><\/p>\n<p>It begins with a doc file named \u201cMinecraft how to play guide.docm\u201d, which is a Microsoft word file. This file contains an image of the Minecraft game along with some abusive Russian text.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89226 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig2.png\" alt=\"\" width=\"945\" height=\"566\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2.png 945w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2-300x180.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2-768x460.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2-650x390.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2-789x473.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig2-250x150.png 250w\" sizes=\"(max-width: 945px) 100vw, 945px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 2: Image of the Minecraft game in Microsoft word file.<\/h6>\n<p>This doc file contains macro, which is executed automatically if macros are enabled. The macro is simple and uses cmd.exe to further execute a PowerShell command to download an additional executable. This executable is saved as mess.exe and executed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89227 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig3.png\" alt=\"\" width=\"937\" height=\"541\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig3.png 937w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig3-300x173.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig3-768x443.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig3-650x375.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig3-789x456.png 789w\" sizes=\"(max-width: 937px) 100vw, 937px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 3: Extracted macro<\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89228 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig4.png\" alt=\"\" width=\"946\" height=\"471\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig4.png 946w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig4-300x149.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig4-768x382.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig4-650x324.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig4-789x393.png 789w\" sizes=\"(max-width: 946px) 100vw, 946px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 4: Network Capture of \u2018mess.exe\u2019 download<\/h6>\n<p>The \u2018mess.exe\u2019 is a loader for Poulight. It carries two more executable stored in \u2018RCDATA\u2019 resources. The names A1 and A2 in RCDATA contain .exe files and B1 and B2 contain the respective names of those executables.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89229 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig5.png\" alt=\"\" width=\"925\" height=\"281\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig5.png 925w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig5-300x91.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig5-768x233.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig5-650x197.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig5-789x240.png 789w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 5: \u2018RCDATA\u2019 resource of \u2018mess.exe\u2019.<\/h6>\n<p>The \u2018mess.exe\u2019, upon execution, drops the executables present in RCDATA to the %tmp% folder and executes them using \u2018ShellExecuteA\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89230 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig6.png\" alt=\"\" width=\"877\" height=\"273\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig6.png 877w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig6-300x93.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig6-768x239.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig6-650x202.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig6-789x246.png 789w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 6: Execution using \u2018ShellExecuteA\u2019<\/h6>\n<p>The two dropped executables into the %tmp% folder are \u2018fakerror.exe&#8217; and \u2018injector (automatic).exe\u2019.<\/p>\n<p>Here is the complete process flow of Poulight Stealer.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89231 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig7.png\" alt=\"\" width=\"594\" height=\"119\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig7.png 594w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig7-300x60.png 300w\" sizes=\"(max-width: 594px) 100vw, 594px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 7: Process flow of Poulight Stealer<\/h6>\n<p>The fakerror.exe is a .NET executable and does exactly as the name implies. Its sole purpose is to fake an error message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89232 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig8.png\" alt=\"\" width=\"923\" height=\"250\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig8.png 923w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig8-300x81.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig8-768x208.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig8-650x176.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig8-789x214.png 789w\" sizes=\"(max-width: 923px) 100vw, 923px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 8: Fake error message.<\/h6>\n<p>The fake message is in the Turkish language, as shown in the above figure. Relying on google translate, the message means \u2018The Program cannot be started. VM or Windows under update 10 detected\u2019.<\/p>\n<p>However, It is trying to disguise as if executable did not run when the other executable (\u2018injector(automatic).exe\u2019) was running successfully.<\/p>\n<p>The next executable \u2018injector(automatic).exe\u2019 is the actual Poulight Stealer. When injector(automatic).exe is run on the target system, one of the first things it does is to check whether it is running on an actual computer or a virtual machine. If a virtual machine activity is detected, the malware is terminated.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89233 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig9.png\" alt=\"\" width=\"957\" height=\"481\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig9.png 957w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig9-300x151.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig9-768x386.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig9-650x327.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig9-789x397.png 789w\" sizes=\"(max-width: 957px) 100vw, 957px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 9: Anti-VM Technique<\/h6>\n<p>The above function uses classic Windows Management Instrumentation (WMI) through the execution of the query \u201cSelect * from Win32_ComputerSystem\u201d.<\/p>\n<p>The following are the few checks that are used to detect Virtual Environment and Sandboxing.<\/p>\n<ul>\n<li>VIRTUAL<\/li>\n<li>vmware<\/li>\n<li>VirtualBox<\/li>\n<li>cmdvrt32.dll (Comodo sandbox)<\/li>\n<li>SxIn.dll (Avast sandbox)<\/li>\n<li>sbiedll.dll (Sandboxie)<\/li>\n<li>Sf2.dll (Avast Sandbox\u201d<\/li>\n<li>snxhk.dll (Avast sandbox)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89234 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig10.png\" alt=\"\" width=\"925\" height=\"337\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig10.png 925w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig10-300x109.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig10-768x280.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig10-650x237.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig10-789x287.png 789w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 10: Main module wrapping malicious code<\/h6>\n<p>Then the malware creates two random folders in \u2018C:\\Users\\&lt;user&gt;\\AppData\\Local\\&lt;random-8-letters&gt;\u2019 which are used later. Also, the path of folders like Desktop, AppData, Local AppData, and Documents is stored in class variables.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89235 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig11.png\" alt=\"\" width=\"925\" height=\"173\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig11.png 925w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig11-300x56.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig11-768x144.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig11-650x122.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig11-789x148.png 789w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 11: Special Folder creation functions<\/h6>\n<p>Then the configuration and parameters are read from the resources. Below is the code responsible for the reading of configuration and parameters. Parameters are store in an array for further use.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89236 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig12.png\" alt=\"\" width=\"934\" height=\"407\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig12.png 934w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig12-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig12-768x335.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig12-650x283.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig12-789x344.png 789w\" sizes=\"(max-width: 934px) 100vw, 934px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 12: Configuration and parameters export function<\/h6>\n<p>Below is the figure of decoded configuration and parameters.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89237 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig13.png\" alt=\"\" width=\"935\" height=\"84\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig13.png 935w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig13-300x27.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig13-768x69.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig13-650x58.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig13-789x71.png 789w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 13: Decoded configuration<\/h6>\n<p>A check for the presence of a file in %tmp% directory is performed which indicates the pre-existence of the malware. This file is used as a mutex to prevent the re-infection of the same system on which it is already present. Subsequently, the prime function responsible for all information gathering and exfiltration is called. This function is named \u2018Start\u2019 which is present in the \u2018xs\u2019 class. The very first function inside this \u2018Start\u2019 is \u2018Information.AVDetect()\u2019 which is used for as name suggest, detecting any AV product installed. The system information is extracted from the registry. This information includes Username, Machinename, and Processor and Video Controller which can be used for the identification of virtual machines.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89238 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig14.png\" alt=\"\" width=\"927\" height=\"456\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig14.png 927w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig14-300x148.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig14-768x378.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig14-650x320.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig14-789x388.png 789w\" sizes=\"(max-width: 927px) 100vw, 927px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 14: Function for retrieving the configuration of the victim machine<\/h6>\n<p>This gathered information is stored in one of the two folders generated in Local AppData in a file named \u2018PC-Information.txt\u2019. A list of all running processes is also stored in the same directory in a file named \u2018ProcessList.txt\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89239 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig15.png\" alt=\"\" width=\"939\" height=\"339\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig15.png 939w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig15-300x108.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig15-768x277.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig15-650x235.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig15-789x285.png 789w\" sizes=\"(max-width: 939px) 100vw, 939px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 15: Function for retrieving the configuration of the victim machine<\/h6>\n<p>After gathering of system info, now it starts stealing of sensitive data from various programs actively. Below is the list of capabilities of malware to steal data from infected systems.<\/p>\n<ul>\n<li>Desktop Capture<\/li>\n<li>Webcam Capture<\/li>\n<li>Sensitive Documents<\/li>\n<li>Filezilla Credentials<\/li>\n<li>Social media apps Info<\/li>\n<li>CryptoCurrencies Info<\/li>\n<li>Browser info<\/li>\n<li>Clipboard data<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89240 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig16.png\" alt=\"\" width=\"609\" height=\"384\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig16.png 609w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig16-300x189.png 300w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 16: All functions responsible for stealing sensitive data<\/h6>\n<p>The DesktopImg.Start() function takes a screenshot of active desktop on system. Webcam.start() captures a webcam picture.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89241 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig17.png\" alt=\"\" width=\"931\" height=\"303\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig17.png 931w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig17-300x98.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig17-768x250.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig17-650x212.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig17-789x257.png 789w\" sizes=\"(max-width: 931px) 100vw, 931px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 17: Function for taking a screenshot of the active desktop on the victim machine<\/h6>\n<p>The DFiles class is interesting as it carries the extension list of sensitive documents to steal data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89242 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig18.png\" alt=\"\" width=\"935\" height=\"270\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig18.png 935w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig18-300x87.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig18-768x222.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig18-650x188.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig18-789x228.png 789w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 18: Function for searching the files with the specific extensions<\/h6>\n<p>Files collected having these extensions are searched for common words for storing credentials like password and login.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89243 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig19.png\" alt=\"\" width=\"931\" height=\"369\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig19.png 931w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig19-300x119.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig19-768x304.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig19-650x258.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig19-789x313.png 789w\" sizes=\"(max-width: 931px) 100vw, 931px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 19: List of common words searched inside the documents<\/h6>\n<p>The search() function hunts all browsers and there login data paths using string_0() and BrowList2() functions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89244 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig20.png\" alt=\"\" width=\"934\" height=\"459\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig20.png 934w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig20-300x147.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig20-768x377.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig20-650x319.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig20-789x388.png 789w\" sizes=\"(max-width: 934px) 100vw, 934px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 20: function for hunting all browsers and there login data paths<\/h6>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89245 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig21.png\" alt=\"\" width=\"935\" height=\"428\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig21.png 935w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig21-300x137.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig21-768x352.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig21-650x298.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig21-789x361.png 789w\" sizes=\"(max-width: 935px) 100vw, 935px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 21: Functions containing all browsers and there login data paths<\/h6>\n<p>All the scraped information is stored inside of the previous Local AppData directory. Below is the massive amount of sensitive data that the stealer has captured.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89246 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig22.png\" alt=\"\" width=\"919\" height=\"580\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig22.png 919w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig22-300x189.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig22-768x485.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig22-618x390.png 618w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig22-789x498.png 789w\" sizes=\"(max-width: 919px) 100vw, 919px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 22: Folder containing all stolen data<\/h6>\n<p>All this information is zipped together in a new file in the AppData roaming directory.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89247 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig23.png\" alt=\"\" width=\"920\" height=\"95\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig23.png 920w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig23-300x31.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig23-768x79.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig23-650x67.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig23-789x81.png 789w\" sizes=\"(max-width: 920px) 100vw, 920px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 23: Path for zipped information<\/h6>\n<p>This zip file along with the other collected information is stored in a unique data structure.<\/p>\n<p>This collected data is then uploaded to URL \u2018https:\/\/f0429164[.]xsph.run\/Panel\/gate.php\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89248 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig24.png\" alt=\"\" width=\"921\" height=\"520\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig24.png 921w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig24-300x169.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig24-768x434.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig24-650x367.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig24-789x445.png 789w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 24: Function to upload to the URL the stolen information<\/h6>\n<p>After successful uploading of data, there is a provision to download an additional payload from the below URL \u2018https:\/\/ru-uid-507352920[.]pp.ru\/example.exe\u2019. It can also be used for the self-update.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89249 \" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig25.png\" alt=\"\" width=\"921\" height=\"50\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig25.png 921w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig25-300x16.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig25-768x42.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig25-650x35.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig25-789x43.png 789w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 25: Additional payload used for the self-update<\/h6>\n<p>Quick Heal detects all the malicious components of this malware. The main \u2018injector(automatic).exe\u2019 i.e poulight.exe detected as \u201cTrojan.Stealer.S12567177\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89250 size-full\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/06\/fig26.png\" alt=\"\" width=\"466\" height=\"249\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig26.png 466w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/06\/fig26-300x160.png 300w\" sizes=\"(max-width: 466px) 100vw, 466px\" \/><\/p>\n<h6 style=\"text-align: center;\">Fig 26: Detection of injector(automatic).exe (poulight.exe )<\/h6>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div>\n<div>\n<div data-tid=\"messageBodyContainer\">\n<div data-tid=\"messageBodyContent\">\n<div>\n<div>\n<div>Poulight stealer has an unimaginable ability to steal sensitive information. Infostealer market is one of the most gainful for cybercriminals. Information collected from infected systems could be resold in the cybercrime underground or used for the credential filling attack. In the future, it has the potential to become a sophisticated and infamous stealer looking at the rate of growth. However, for now, it lacks the obfuscation and any novelty in its code. No matter which road it takes, we will be monitoring it.<\/div>\n<\/div>\n<div>\n<p><strong>IOCs:<\/strong><\/p>\n<p><strong>Filename:<\/strong> minecraft how to play guide.docm\u00a0 <strong>MD5:<\/strong> 7FBC52BB2BCE064A51D671C8CA20FB1E<\/p>\n<p><strong>Filename:<\/strong> injector(automatic).exe (Poulight.exe) <strong>MD5<\/strong>: 8E855BCB97E9D1DCB2C79C580DCA7F2D<\/p>\n<p><strong>Filename:<\/strong> Mess.exe (ET3.exe) <strong>MD5:<\/strong> 58386adaea3b5e737144388e6607d8a5<\/p>\n<p><strong>Filename:<\/strong> fakerror.exe\u00a0<strong>MD5<\/strong>: 3F4BC3D0287D911603691767C5D372FA<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\u200b<\/div>\n<div>\n<div data-tid=\"messageBodyContainer\">\n<div data-tid=\"messageBodyContent\">\n<div>\n<div>\n<div><strong>Subject Matter Expert <\/strong><\/div>\n<div>Akshay Gaikwad | Rahul Sharma | Quick Heal Security Labs<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was sold in just a handful [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":89251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-89223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89223"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89223"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89223\/revisions"}],"predecessor-version":[{"id":89255,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89223\/revisions\/89255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89251"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}