AryaN IRC Botnet discovered in the wild (April 5, 2012)

By

The SonicWALL Threat Research team discovered a new IRC bot Trojan in the wild with DDoS (Distributed Denial Of Service) functionality. This Trojan also has the ability to spread through USB removeable drives and update itself over the internet.

Once run, the Trojan injects code into explorer.exe and exits. The injected code contains an IRC bot [Detected as GAV: Agent.ADC (Trojan)]. The injected code deletes the original malware file.

The Trojan makes the following DNS requests:

The Trojan determines its IP address by making a request to wipmania.com. It then proceeds to join channel #!y! on a private IRC server.

The Bots idle on IRC awaiting further instructions from its author. They are given names according to Bot type, geographical location, operating system version and CPU architecture as seen in the screenshot below:

The Trojan contains the ability to spread through USB removeable drives. It also contains UDP flooding functionality for DDoS (distributed denial of service attacks):

Upon further analysis we found that the Trojan also contains the ability to update itself by downloading a new version from a remote webserver.

The Trojan adds the following file to the file system:

  • C:Documents and Settings{USER}Application Datasvhost.exe [Detected as GAV: Agent.ADC (Trojan)]

The Trojan adds the following keys to the windows registry to enable startup after system reboot:

  • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun svhost.exe “C:Documents and Settings{USER}Application Datasvhost.exe”
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun svhost.exe “C:Documents and Settings{USER}Application Datasvhost.exe”
  • HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun egregregerfwde “C:Documents and Settings{USER}Application Datasvhost.exe”

SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:

  • GAV: IRCbot.AYN (Trojan)
  • GAV: Agent.ADC (Trojan)
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.