ACCE Release Notes v2.9.20250508

This release consists of the following:

rutserv

While analyzing the malware described by Ontinue and ReliaQuest, we identified that the sideloaded DLL TV.dll (SHA256 782e997382734a4c80b6f2c6aef51a55c9434457f5ee125a3cf5938ec7a72f55) is a loader for an AutoHotkey script stored in its RT_RCDATA\\1 resource. During research, we identified two additional samples on VirusTotal, and all three samples referred to themselves as “rutserv”.

Each sample is configured with a URL in 5.252.153.0/24 and has the following capabilities:

  • Downloads Components
  • Keylogging
  • System information logging
  • Browser information stealing

Samples:

MonsterCrypt / Aurotun

When adding a module Aurotun malware, we observed that the configuration data blob was structured as follows:

OffsetSize (in bytes)Description
032Seed for deriving XChaCha20-Poly1305 parameters
328Size of following data
40<VARIABLE>Encrypted data and Message authenticator (last 16-bytes of data)

Using the information in the table above, the configuration data is decrypted using the following methodology:

  • The key and nonce for the XChaCha20-Poly1305 algorithm are derived using the BLAKE2b hashing algorithm against the seed
  • The encrypted buffer is XChaCha20-Poly1305 decrypted
  • The decrypted data is zlib decompressed
  • The result is a JSON formatted dictionary containing an “ip”, “port”, “build_name”, varying flags, and Base64 encoded private keys

When analyzing the list of samples from the X post, we observed that some samples were contained in a loader with a PDB path descripting “MegaCrypt” and “MonsterCrypt”. When seeking additional samples on VirusTotal, we observed two variants of the loader that we are calling “MonsterCrypt”, one which stores the embedded component in plaintext, and a second which zlib decompresses the component.

Posted in Uncategorized and tagged , .