[Scan Report & Debloated download]: Unique Proxy Scraper v0.1 (shared by Betski) 06-07-2020, 02:49 PM
#1
Thanks to @HailHydra, this woudn't have been revealed without him notifiying me about Betski's software posts
When loading the executable, it will unpack in a folder (%appdata%), here are the files extracted by the application
![[Image: FANSePY.png]](https://i.imgur.com/FANSePY.png)
Loader.cmd is where the malware gets downloaded, via this command
![[Image: aroKKmm.png]](https://i.imgur.com/aroKKmm.png)
The file that gets downloaded (Sys.exe) is luckily using the .NET Framework, which im really good at, so i've unpacked it via dnspy, and heres what i've found inside it:
![[Image: pwii9we.png]](https://i.imgur.com/pwii9we.png)
![[Image: c89Cxda.png]](https://i.imgur.com/c89Cxda.png)
![[Image: cUFtC6J.png]](https://i.imgur.com/cUFtC6J.png)
![[Image: qEwe4FE.png]](https://i.imgur.com/qEwe4FE.png)
![[Image: Ta1wqfS.png]](https://i.imgur.com/Ta1wqfS.png)
The application steals browser informations, credit cards, gets your location, checks if it is in a vm, sandboxed or not (i don't know if it tries to exit out of the vm/sandbox)
+
Loader.exe got created the same day as the thread was released, the application was made back in 2018, the cmd file was made the 11th of May
![[Image: Glz8euVnToSK86N1Lczgrg.png]](https://image.prntscr.com/image/Glz8euVnToSK86N1Lczgrg.png)
![[Image: 0zYHvlSsSMaK5wYPf5bCGw.png]](https://image.prntscr.com/image/0zYHvlSsSMaK5wYPf5bCGw.png)
You can download the app without Betski's malware, it still however has a lot of detections
Files in zip (3):
@mothered
@Oni
When loading the executable, it will unpack in a folder (%appdata%), here are the files extracted by the application
![[Image: FANSePY.png]](https://i.imgur.com/FANSePY.png)
Loader.cmd is where the malware gets downloaded, via this command
![[Image: aroKKmm.png]](https://i.imgur.com/aroKKmm.png)
The file that gets downloaded (Sys.exe) is luckily using the .NET Framework, which im really good at, so i've unpacked it via dnspy, and heres what i've found inside it:
![[Image: pwii9we.png]](https://i.imgur.com/pwii9we.png)
![[Image: c89Cxda.png]](https://i.imgur.com/c89Cxda.png)
![[Image: cUFtC6J.png]](https://i.imgur.com/cUFtC6J.png)
![[Image: qEwe4FE.png]](https://i.imgur.com/qEwe4FE.png)
![[Image: Ta1wqfS.png]](https://i.imgur.com/Ta1wqfS.png)
The application steals browser informations, credit cards, gets your location, checks if it is in a vm, sandboxed or not (i don't know if it tries to exit out of the vm/sandbox)
+
Loader.exe got created the same day as the thread was released, the application was made back in 2018, the cmd file was made the 11th of May
![[Image: Glz8euVnToSK86N1Lczgrg.png]](https://image.prntscr.com/image/Glz8euVnToSK86N1Lczgrg.png)
![[Image: 0zYHvlSsSMaK5wYPf5bCGw.png]](https://image.prntscr.com/image/0zYHvlSsSMaK5wYPf5bCGw.png)
This proves that @Betski had already shared malwares on the forum, which is against the rules, therefore should be banned
You can download the app without Betski's malware, it still however has a lot of detections
Files in zip (3):
Code:
[Debloated] - Unique Proxy Scrapper v1.zip
|- SkinSoft.VisualStyler.dll | 1.03mb
|- Unique.Proxy.Scraper.v0.1.exe | 399kb
|- xNet.dll | 116kb
@mothered
@Oni
(This post was last modified: 06-07-2020, 03:15 PM by miso.)