Verschlüsselte Herzen: Offenlegung des HeartCrypt Packer-as-a-Service-Betriebs

Teilen:
Category Einzelheiten
Threat Actors Unknown actors offering the HeartCrypt PaaS targeting various regions and industries.
Campaign Overview HeartCrypt is a Packer-as-a-Service (PaaS) launched in February 2024, used to protect malware by obfuscating code within legitimate binaries. Advertised in underground forums and Telegram, it supports 32-bit Windows payloads for $20 per file.
Target Regions (Victims) Observed campaigns in Latin America and other global regions. Specific targets include industries and individuals.
Methodology HeartCrypt injects malicious code into legitimate executables. Techniques include:
➡ Control flow hijacking
➡ Obfuscation (stack strings, junk bytes, etc.)
➡ Anti-sandboxing methods (loop emulation and Windows Defender evasion)
Product Targeted Windows systems, particularly 32-bit binaries.
Malware Reference Associated with LummaStealer, Remcos RAT, XWorm, Quasar RAT, RedLine Stealer, and others.
Tools Used ➡ Telegram
➡ Underground forums (e.g., XSS.is, Exploit.in, BlackHatForums)
➡ API abuse (e.g., LoadResource, VirtualProtect)
Vulnerabilities Exploited Anti-sandbox evasion techniques targeting:
➡ Windows Defender’s VDLL
➡ VM detection with d3d9 library
➡ Dependency emulation checks
TTPs ➡ Packer services for malware
➡ Use of legitimate binaries for obfuscation
➡ Extensive use of control flow obfuscation (jmp instructions, PIC)
➡ Dynamic API resolution
➡ Tailored payload injection into binaries
Attribution Development observed since July 2023 by unknown operators, possibly cybercriminal syndicates.
Recommendations ➡ Implement robust sandboxing to detect obfuscated code
➡ Monitor suspicious use of LoadResource and other API calls
➡ Enhance behavioral analysis to detect unusual control flow manipulations
➡ Educate users about risks of downloading executables from unverified sources
Quelle  Palo Alto Networks (Unit 42)

Read full article: https://unit42.paloaltonetworks.com/packer-as-a-service-heartcrypt-malware/

The above summary has been generated by an AI language model

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:14 am, Mai 9, 2025
Wetter-Symbol 10°C
L: 9° | H: 11°
broken clouds
Luftfeuchtigkeit: 79 %
Druck: 1020 mb
Wind: 6 mph E
Windböe: 9 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:17 am
Sonnenuntergang: 8:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
9° | 11°°C 0 mm 0% 12 mph 79 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
9° | 20°°C 0 mm 0% 12 mph 86 % 1021 mb 0 mm/h
So. Mai 11 10:00 pm
Wetter-Symbol
11° | 23°°C 0.94 mm 94% 12 mph 86 % 1015 mb 0 mm/h
Mo. Mai 12 10:00 pm
Wetter-Symbol
12° | 21°°C 0.97 mm 97% 11 mph 95 % 1016 mb 0 mm/h
Di. Mai 13 10:00 pm
Wetter-Symbol
13° | 21°°C 0.46 mm 46% 11 mph 77 % 1022 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
10° | 12°°C 0 mm 0% 8 mph 79 % 1021 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
12° | 16°°C 0 mm 0% 12 mph 66 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
15° | 17°°C 0 mm 0% 11 mph 48 % 1020 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 9 mph 40 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
12° | 12°°C 0 mm 0% 8 mph 63 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
9° | 9°°C 0 mm 0% 4 mph 86 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 79 % 1020 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,373.76
4.46%
Ethereum(ETH)
€2,111.01
22.89%
Fesseln(USDT)
€0.89
0.00%
XRP(XRP)
€2.08
6.94%
Solana(SOL)
€147.38
9.05%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.183888
13.59%
Shiba Inu(SHIB)
€0.000013
10.90%
Pepe(PEPE)
€0.000011
33.75%
Peanut das Eichhörnchen(PNUT)
€0.247675
65.37%
Nach oben scrollen