What I have learned over the years as a hobby malware analyst is whenever you think you are the first who discovered a new malware family, you can be sure at least a dozen people are already working on the threat. And I am not speaking about what you can later see in public...
As in the case of the recently discovered banker named
Dyre this is no exception. While cleaning up my malware collection yesterday, I stumbled upon a malware threat which
Anton Cherepanov and I briefly analyzed 3 months ago. After a quick search on the Internet, I realized that this sample which was first discovered by
ESET and named
Win32/Battdil.A respectively
Win64/Battdil.A is the recently publicated threat named
Dyre or
Dyreza banker. You can read about this malware here:
http://phishme.com/project-dyre-new-rat-slurps-bank-credentials-bypasses-ssl/
https://www.csis.dk/en/csis/news/4262/
https://www.csis.dk/en/csis/blog/4318/
http://stopmalvertising.com/malware-reports/introduction-to-dyreza-the-banker-that-bypasses-ssl.html
http://stopmalvertising.com/malware-reports/analysis-of-dyreza-changes-network-traffic.html
During our analysis, we found an active C&C server together with an early version of the webpanel (probably a test version). This article just gives you an overview of the webpanel in the form of various screenshots which we (fortunately) made. As the whole webpanel is made in Russian and I only know a handful of Russian words, the translation is left to the reader. You can find the downloaded HTML output (and the sample) at the end of this article.
I added the name CdIL to the caption, because the PDB string inside the payload said so:
C:\CPP_PROJECTS_GIT\CdIL\Release\iebattle.pdb
But now, sit back, relax and enjoy the short slideshow before you start your weekend...
|
Figure 1: Login |
|
Figure 2: couriers.php |
|
|
|
|
|
Figure 3: couriers.php (cont'd) |
|
Figure 4: couriers.php (cont'd) |
|
Figure 5: stuff.php |
|
Figure 6: stuff.php (cont'd) |
|
Figure 7: material.php |
|
Figure 8: tasks.php |
|
Figure 9: shop_orders.php |
|
Figure 10: domains.php |
|
Figure 11: email.php |
|
Figure 12: rules.php |
|
Figure 13: conditions.php |
|
Figure 14: conditions.php (cont'd) |
|
Figure 15: conditions.php (cont'd) |
|
Figure 16: conditions.php (cont'd) |
|
Figure 17: conditions.php (cont'd) |
|
Figure 18: conditions.php (cont'd) |
|
Figure 19: conditions.php (cont'd) |
|
Figure 20: conditions.php (cont'd) |
|
Figure 21: conditions.php (cont'd) |
|
Figure 22: orders.php |
PW: "infected" (without "")
That's it
0 Kommentare:
Post a Comment