Analysis by: Neljorn Nathaniel Aguas

ALIASES:

a variant of WinGo/Ngrok.B potentially unsafe application (NOD32)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Potentially Unwanted Application

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size: 27,545,832 bytes
File Type: EXE
Initial Samples Received Date: 26 Sep 2024

Arrival Details

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Other Details

This Potentially Unwanted Application does the following:

  • It exposes local networked services behinds NATs and firewalls to the public internet over a secure tunnel.
  • It is capable of sharing local websites, build/test webhook consumers and self-host personal services.
  • It uses the following version of ngrok:
    • Ngrok 3.16.0

It accepts the following parameters:

  • api → use ngrok agent as an api client
  • completion → generates shell completion code for bash or zsh
  • config → update or migrate ngrok's configuration file
  • credits → prints author and licensing information
  • diagnose → diagnose connection issues
  • help → Help about any command
  • http → start an HTTP tunnel
  • service → run and control an ngrok service on a target operating system
  • start → start endpoints or tunnels by name from the configuration file
  • tcp → start a TCP tunnel
  • tls → start a TLS tunnel
  • tunnel → start a tunnel for use with a tunnel-group backend
  • update → update ngrok to the latest version
  • version → print the version string
  • --config {strings} → path to config files (merged if multiple)
  • -h | --help → help for ngrok
  • --metadata string → opaque user-defined metadata for the tunnel session
  • -v | --version → version for ngrok

  SOLUTION

Minimum Scan Engine: 9.800
SSAPI PATTERN File: 2.767.00
SSAPI PATTERN Date: 03 Oct 2024

Step 1

Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.

Step 2

Scan your computer with your Trend Micro product to delete files detected as PUA.Win64.Ngrok.E. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.