
The Dell SonicWALL Threats Research team came across a new Infostealer Trojan with Bitcoin mining and DDoS capabilities. This Trojan steals sensitive information from the user machine and uses the compromised system for Bitcoin mining activity as well as DDoS attacks.
Infection Cycle:
Upon execution, the Trojan creates the following files on the victim machine:
It adds the following registry key to ensure infection upon reboot:
The Trojan also adds multiple registry keys to prevent executables belonging to various Host AntiVirus and Security Tools from running. The images below show the code where the registry key values are being constructed for various security programs:
The following are examples of registry keys that got added on the infected system to prevent HijackThis and Malwarebytes from running:
The Trojan injects code into the process wuauclt.exe which is a genuine windows process. It also checks the presence of the following softwares and if found, terminates.
It injects the dropped executable in NT Kernal0 folder into running processes and this executable acts as a watcher process for wuauclt.exe. If the injected wuauclt.exe process is terminated, the watcher process will respawn the wuauclt.exe and injects it with malicious code.
The Trojan looks for following applications on the victim machine and steals User credentials, Connection details, Game Keys, and User's contact list:
The Trojan attempts to connect to the following domains to upload stolen information and downloads the bitcoin mining files:
We also found traces of DDoS commands like slowloris, rudy, condis, httpget and udp as seen below:
Below is the description for these commands posted on underground forums:
The Trojan also disables following Windows system services:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News