
Dell SonicWALL Threats Research Team received reports of a password stealing Malware capable of collecting stored passwords from Email, IM and Internet Browsers using third party programs. Once stolen, the passwords are sent to the attacker.
Infection Cycle
Upon execution the Malware drops the following files in %SystemDrive%userspublicPublic Document folder
It makes the following changes to the registry to ensure execution upon reboot:
The Malware begins execution in the following order:
The next time system reboots the flow will begin from aatd.bat which is triggered into execution from the Registry Run key:
Mail Password Decryptor is a free tool to recover passwords from email clients. As listed by the author it supports password recovery from:
Browser Password Decryptor is a free tool to recover website login passwords from Web Browsers. As listed by the author it supports password recovery from:
The followiing passwords were captured from our Browsers and Mail Clients when the sample was being analyzed, this file would then be sent to the attacker:
The passwords stored by the Malware are transferred to the attacker via ftp to ftp.freehostia.com. Credentials and commands for the ftp file transfer are stored in the bms.klm file but during our analysis they did not work indicating that they have been changed.
Both Mail Password Decryptor and Browser Password Decryptor are freely available on a reputed security forum. This Malware is a classic example illustrating misuse of Security Tools developed for non-malicious purposes. Using freely available tools it tries to steal passwords from the victim's system and sends them to the attacker without the victim's knowledge.
Dell SonicWALL Gateway AntiVirus provides protection against these threats with the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News