New Dorkbot variant targeting skype users (Oct 19, 2012)

By

Dell SonicWALL Threats Research team came across a new variant of the Dorkbot worm specifically targeting Skype users. Dorkbot also known as Ngrbot is known to spread through instant messengers, social networking websites, and removable drives. However, this is the first instance we saw that targets Skype users as well by hooking to Skype APIs.

The malware executable is named as Skype_(Date)_(img or foto).exe and uses Skype’s official icons for disguise as seen below:

screenshot

Infection Cycle

  • The new variant when executed, drops a copy of itself in the user’s Application Data directory and also modifies registry to ensure that it runs on system reboot:
    • Dropped File – (Application Data)Whzkzg.exe (copy of itself)
    • Registry – HKCUSoftwareMicrosoftWindowsCurrentVersionRunWhzkzg: “%AppData%Whzkzg.exe”
  • Connects to api.wipmania.com to determine the public IP address of the infected system.
  • It was found to be actively sending out Skype IMs to the infected user’s Skype contacts. The message is sent in local default language of the infected system and consists of a shortened URL that leads to the download of the Skype Dorkbot variant as seen below:
  • screenshot

    Statistics of clicks registered for the shortened malicious URL (courtesy Google) shows that it has received more than 200,000 visits in past one month:

    screenshot

  • It is also capable of spreading via MSN Messenger, removable drives, and various social networking sites by posting comments. Below is the list of propagation vectors:
  • screenshot

  • The Dorkbot variant we analyzed connects to one of the following domains on TCP port 1863:
    • mars.dothome.pl
    • venus.timeinfo.pl
    • photobeat.su

    It also contains a hardcoded command and control IP address: 188.40.15.29 that it connects on TCP port 1863 if the above mentioned domains fail to resolve.

  • Dorkbot is also known to download and install other malware family payloads as part of Pay Per Install scheme where the author gets paid for every successful install. In our analysis we found that the sample downloaded two different payloads from the file sharing service hotfile.com:
    • hotfile.com/dl/1765672(REMOVED).html -> (Application Data)4C.exe [Backdoor Trojan detected as GAV: Simda.FFK (Trojan)]
    • hotfile.com/dl/1765679(REMOVED).html -> (Application Data)4D.exe [Ransomware detected as GAV: PornoAsset.ANHR (Trojan)]

    It utilizes the Ruskill feature to install these downloaded malware files, which is known to keep track of system file and registry changes. The Ruskill feature also ensures that these files are removed upon system reboot.

  • It also contains modules for ftpgrab, formgrab, popgrab, and HTML injection, which are used in monitoring following URLs to steal user credentials:
  • screenshot

  • The bot is also capable of performing DDoS attacks via following three modules:
    • slowloris flood
    • UDP flood
    • SYN flood

Dell SonicWALL Gateway AntiVirus provides protection against this threat via following signatures:

  • GAV: Dorkbot.SKP (Trojan)
  • GAV: Dorkbot.SKP_2 (Trojan)
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.