
The Dell Sonicwall Threats Research team have discovered an info stealer Trojan that is dropped onto unpatched machines as part of a drive-by-attack. The attack uses the CVE-2014-0502 vulnerability which has been covered recently in a previous SonicAlert.
Infection Cycle:
The Trojan adds the following files to the filesystem:
The Trojan adds the following key to the Windows registry:
The Trojan makes the following DNS query:

YahooCache.ini contains the following data:

The Trojan downloads an additional malicious file and saves it as MSMAPI.OCX :

It runs MSMAPI.OCX using the following commandline:
rundll32 %TEMP%MSMAPI.OCX,RunProcGoa
The Trojan runs the following commands to gather system information:
cmd.exe /C ipconfig /allcmd.exe /A /C rundll32 %TEMP%MSMAPI.OCX,RunProcGoAcmd.exe /C net startcmd.exe /C tasklistcmd.exe /C systeminfocmd.exe /C netstat -ancmd.exe /C net viewcmd.exe /C dir "%userprofile%recent"$NtUninstallKB942388$ contains the following data derived from the commands above:
The stolen system information was observed being sent to a remote C&C server:

The Trojan periodically contacts the C&C server to announce its presence. It sends its internal IP address as the value for "&ClientId" and obtains its external IP address from the server:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News