
The Dell Sonicwall Threats Research team has received reports of a recent variant of the Urelas Trojan. This Trojan is known for its spying capability and has the ability to monitor certain gaming applications. It also sends screenshots and other system information to a remote C&C server. It can also download and install malware from other families.
Infection Cycle:
The Trojan uses the following icon:

The Trojan adds the following files to the filesystem:
The Trojan adds the following keys to the Windows registry:
The .bat file dropped by pokdre.exe contains the following script to clean up traces of the infection:
:Repeatdel "{rundir}pokdre.exe"if exist "{rundir}pokdre.exe" goto Repeatrmdir "{rundir}"del "%USERPROFILE%Local SettingsTempsanfdr.bat"The Trojan was observed engaging in the following encrypted communication with a remote C&C server. All communication is tagged with the AS101 string:

The Trojan was later seen requesting and downloading an additional malicious executable file (pokdre.exe) :
golfinfo.ini contains the following encrypted data:

This data was seen being sent from the C&C server. The .dat files d3d8caps.dat and d3d9caps.dat contain decrypted data that was sent from the C&C server.
During analysis we were able to identify a very basic decryption routine which simply uses the NOT operator for decryption:

Using the above knowledge we were able to fully decrypt golfinfo.ini thus revealing 2 C&C server ip addresses and infection filenames:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News