This New Malware Family Using CLFS Log Files to Avoid Detection

New Malware Family
Share It On:

5th September 2021, Kathmandu

Cybersecurity researchers have disclosed details about an incipient malware family that relies on the Mundane Log File System (CLFS) to obnubilate a second-stage payload in registry transaction files in an endeavor to eschew detection mechanisms.

FireEye’s Mandiant Advanced Practices team, which made the revelation, dubbed the malware PRIVATE LOG, and its installer, STASHLOG. Specifics about the identities of the threat actor or their motives remain obscure.

Albeit the malware is yet to be detected in genuine-world attacks aimed at customer environments or be spotted launching any second-stage payloads, Mandiant suspects that PRIVATE LOG could still be in development, the work of a researcher, or deployed as a component of a highly targeted activity.

CLFS is a general-purport logging subsystem in Windows that’s accessible to both kernel-mode as well as utilizer-mode applications such as database systems, OLTP systems, messaging clients, and network event management systems for building and sharing high-performance transaction logs.

“Because the file format is not widely used or documented, there are no available implements that can parse CLFS log files,” Mandiant researchers explicated in an indite-up published this week. “This provides assailers with an opportunity to obnubilate their data as log records in a convenient way because these are accessible through API functions.”

PRIVATE LOG and STASHLOG come with capabilities that sanction the malevolent software to linger on infected contrivances and eschew detection, including the utilization of obfuscated strings and control flow techniques that are expressly designed to make static analysis cumbersome. What’s more, the STASHLOG installer accepts a next-stage payload as an argument, the contents of which are subsequently stashed in a concrete CLFS log file.

Fashioned as an un-obfuscated 64-bit DLL designated “prntvpt.dll,” PRIVATE LOG, in contrast, leverages a technique called DLL search order hijacking in order to load the malevolent library when it is called by a victim program, in this case, an accommodation called “PrintNotify.”

“Similarly to STASHLOG, PRIVATE LOG commences by enumerating *.BLF files in the default utilizer’s profile directory and utilizes the.BLF file with the oldest engendering date timestamp,” the researchers noted, afore utilizing it to decrypt and store the second-stage payload.

Mandiant recommends that organizations apply YARA rules to scan internal networks for denotements of malware and keep optical discerners open for potential Designators of Compromise (IoCs) in “process”, “image load” or “file write” events associated with endpoint detection and replication (EDR) system logs.


Share It On:

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Posts

IBN CEO Submits FY 2080/81 Report to PM Oli, Stresses Enhanced PPP
Latest News Top News

IBN CEO Submits FY 2080/81 Report to PM Oli, Stresses

Share It On:26 July 2024, Kathmandu Investment Board Nepal CEO, Sushil Bhatta, submits the FY 2080/81 Performance Contract Report to

Morning Offer on Lumbini Cable Car: Enjoy 50% Discount on Tickets Every Monday from July 29 to September 16, 2024
Banking & Insurance Latest News Top News

Morning Offer on Lumbini Cable Car: Enjoy 50% Discount on

Share It On:26 July 2024, Kathmandu The Lumbini Cable Car has announced an exciting ‘Morning Offer’ available every Monday morning

Realme Narzo N65 5G Price in Nepal: Cutting-Edge Performance and Innovation at Affordable Prices
Gadgets Latest News Top News

Realme Narzo N65 5G Price in Nepal: Cutting-Edge Performance and

Share It On:25 July 2024, Kathmandu realme Unveils New Narzo N65 5G and realme C63 Smartphones: Pushing the Boundaries of

Nabil Bank Launches Nabil Nari Karja: A Game-Changer For Women Entrepreneurs
Banking & Insurance Latest News Top News

Nabil Bank Launches Nabil Nari Karja: A Game-Changer For Women

Share It On:25 July 2024, Kathmandu Nabil Bank is proud to announce the launch of Nabil Nari Karja, an innovative

Leidos Breach Hackers Leak Documents From Pentagon IT Services Provider
Latest News Security Top News

Leidos Breach Hackers Leak Documents From Pentagon IT Services Provider

Share It On:25 July 2024, Kathmandu Learn about the Leidos cyber breach linked to Diligent Corp., which exposed sensitive documents

Appier Partners SkinX Thailand to Revolutionize Dermatology and Telemedicine with AI-Powered Solutions
Latest News Top News

Appier Partners SkinX Thailand to Revolutionize Dermatology and Telemedicine with

Share It On:25 July 2024, Kathmandu Appier announces partnership SkinX Thailand to drive AI-powered digital transformation in dermatology and telemedicine