
The Dell SonicWALL Threats Research team has discovered a new botnet originating from China. Apart from leaking sensitive system information and its potential click-fraud capability, the purpose of the botnet is not known at this time. It does however, contain the ability to receive instructions from a remote C&C server and download and run additional malicious executable files.
Infection Cycle:
Below is a sample of the DNS queries that the Trojan performed during analysis:
The Trojan creates the following files on the filesystem:
The Trojan creates the following keys in the Windows registry:
The Trojan attempts to hide its activity from static analysis by encrypting important Windows API calls that it uses. We were able to locate the decryption routine which revealed the calls during runtime:
The Trojan uses the following 5 Windows API's from wininet.dll for querying HTTP URL's and downloading additional malicious files.
It uses the decrypted WinInet API's to download a file (saq.jpg) with a JPEG extension. It uses the user agent string "NC2E" in the request. The file downloaded is not a JPEG image. It is an encrypted executable that is decrypted and run by the Trojan. It moves this file to %WINDOWS%msisvc.exe and executes it before terminating:
The Trojan uses a server running a copy of Mentalis Proxy Server to validate certificates:
The Trojan communicates to a remote C&C server in order to report infection and obtain further instructions. In this case it was instructed to wait. It sends sensitive information such as the Network Interface Card MAC address, Windows OS version and the external IP address of the compromised machine. The Trojan build version number is sent as the User Agent:
The Trojan was observed receiving the following response from a remote server. The response indicates that the bot is instructed to download and verify a file (qqka0328.jpg) from the specified URL and also simulate webpage visits to the specified URL. It provides a hash for verifying the file:
The msisvc.exe executable contains a valid certificate signed by a trusted authority (WoSign) located in China issued to a company named Taihu county mianyang information and technology Inc:
A quick look up of the e-mail address associated with the Digital Signature - 532476028@qq.com came up with the following job postings by the same e-mail user for the same company:
Dell SonicWALL UTM appliance provides protection against this threat with the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News