
Cybercriminals use different schemes to attract unsuspecting users and gather personal data passively. From fake delivery notifications, to bank statements and purchase orders; all these have been far too common and easily discernible until recently, the Dell SonicWALL Threats Research team has received reports of a Trojan posing as a romantic message but delivering a keylogger in the background. The main installer uses the following icon:
Figure 1: Installer icon and filename
Infection Cycle:
Upon execution the Trojan drops the following components:
In order to start after reboot the Trojan adds the following keys to the registry:
It then launches Microsoft photo editor, photoed.exe, to open the file tumbler_***.png and display this image:
Figure 2: Fake message displayed
Meanwhile, envtask.exe downloads additional components of a commercial keylogger called SniperSpy and drops them onto the following directories:
Figure 3: Downloading SniperSpyUI.exe
It will then silently monitor all websites visited, keystrokes typed, instant messages sent and various other activities.
Figure 4: Example of activities monitored by SniperSpy based on the strings found in the binary
Collected data are saved into the following directories with a .bin or .sys file extension:
It then sends the initial user information it has gathered (SetX.bin) which includes the computer name, mac address, running processes and currently installed instant messaging clients.
Figure 5: SetX.bin uploaded as SetX.xml
All the data gathered in the numbered sys.bin files are combined into one xml file named rec_*randomdigits*.xml and sent to the remote server. Screen captures are uploaded individually as seen in the figure below:
Figure 6: JPG screenshot file uploaded to a remote server
Dell SonicWALL Gateway AntiVirus provides protection against this threat with the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News