
Overview:
SonicWall's Capture Labs Threat Research Team, recently captured and evaluated a new malicious sample termed Spyder, from China’s "Winnti" hacking group. This backdoor is written in C++ and designed to run on 64-bit Windows. This module is being used for targeted attacks on information storage systems, collecting information about corrupted devices, executing mischievous payloads, coordinating script execution, and C&C server communication. The module is loaded by the MSDTC system service using a well-known DLL Hijacking method. The function names within the modules export table are related to the exported functions of the apphelp.dll system library.
Static Information & Error Checking Information:
Dynamic Information:
Dll Main inside x64 debug:
Encrypted PE File in memory:
Call to Shellcode see RAX:
Dll Main inside Encrypted PE File:
Network Artifacts:
Get Request:
Possible domains in the wild:
Supported Systems:
SonicWall, (GAV) Gateway Anti-Virus, provides protection against this threat:
Appendix:
Sample SHA-1 Hash: 41777d592dd91e7fb2a1561aff018c452eb32c28
Share This Article

An Article By
An Article By
Security News
Security News