New Buzus Trojan (Mar 27 2009)

By

–Updated March 27, 2009—

SonicWALL UTM Research team saw a third wave of DHL Tracking number invoice spam with different attachment payloads starting late afternoon on March 26, 2009.

SonicWALL Gateway Antivirus provides protection against this new wave via GAV: Zbot.JJP (Trojan) signature. Total Signature hits recorded since yesterday – 872,128 hits (Signature statistics image below)

————————————————

–Updated March 26, 2009—

SonicWALL UTM Research team saw a new wave of DHL Tracking number invoice spam with different attachment payloads starting March 25, 2009.

SonicWALL Gateway Antivirus provided proactive protection against this new wave via GAV: Suspicious#waledac.8 (Worm) signature that was released on March 9, 2009. Total Signature hits recorded since yesterday – 576,942 hits (Signature statistics image below)

————————————————

–Original publish date: March 23, 2009—

SonicWALL UTM Research team observed a new wave of the on-going Tracking number invoice spam campaign starting Sunday, March 22, 2008. The email has a zip archived attachment which contains the new Buzus Trojan variant.

SonicWALL has received more than 1,700 e-mail copies of this malware till date. The e-mail looks like following:

Attachment: DHL_DOC.zip (contains DHL_DOC.exe)
Update [March 26, 2009]:
Attachment: DHL_HELP.zip (contains DHL_HELP.exe)
Update [March 27, 2009]:
Attachment: dhl_n756512.zip (contains dhl_n756512.exe)

Subject: DHL Tracking number #[15 digit alphanumeric ID]

Email Body:
————————
Hello!

We were not able to deliver postal package you sent on the 14th of March in time because the recipient’s address is not correct.
Please print out the invoice copy attached and collect the package at our office.

Your personal manager: Nathan Lund,
Customer Service: 1-800-CALL-DHL
Fax: 888-221-6211
DHL International, Ltd. All Rights Reserved.
————————

Update [March 26, 2009]: The executable file inside the zip attachment in the new wave has an icon disguised as a Microsoft Help file and it looks like following:

screenshot

The executable file inside the zip attachment has an icon disguised as a Microsoft Word document file and it looks like following:

screenshot

Update [March 27, 2009]: A screenshot of a sample e-mail for the third wave is shown below:

screenshot

Update [March 26, 2009]: A screenshot of a sample e-mail for the second wave is shown below:

screenshot

A screenshot of a sample e-mail is shown below:

screenshot

The Trojan when executed performs following host level activity:

  • Creates a directory lowsec in Windows System folder
  • Creates files local.ds, user.ds, and user.ds.lll in the lowsec directory
  • Drops a copy of itself as sdra64.exe in Windows system directory

It modifies the following Registry key for running sdra64.exe on system reboot:

  • HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonUserinit: “(System_Dir)userinit.exe,(System_Dir)sdra64.exe,”

It also tries connect and download an encrypted configuration file from the following URL:

  • mn-room.ru/phpbb/dir.cfg

The Trojan is also known as DR/Delphi.Gen [AntiVir], trojan W32/Trojan3.AIY [F-Prot], and VirTool:Win32/DelfInject.gen!J [Microsoft]

SonicWALL Gateway AntiVirus provides protection against this malware via GAV: Buzus.ARQX (Trojan),GAV: Suspicious#waledac.8 (Worm) and GAV: Zbot.JJP (Trojan) signatures.

screenshot

screenshot

screenshot

Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.