K_Mikhail wrote:Dropper: https://www.virustotal.com/file/80c0613 ... /analysis/
Dropped driver: https://www.virustotal.com/file/9998633 ... /analysis/
Infected boot: https://www.virustotal.com/file/431799a ... /analysis/
It is a pretty similar to this
http://labs.bitdefender.com/2012/05/pli ... on-gamers/
\SystemRoot\System32\DownDll.dll is injected in the following processes via queued APC:
Code: Select allEXPLORER.EXE
HIGHLOW2.EXE
POKER7.EXE
LASPOKER.EXE
BADUKI.EXE
DUELPOKER.EXE
The following processes will be terminated if found (check is running inside system thread by calling
pNtQuerySystemInformation and the doing 100500 wcsicmp):
Code: Select allMpCmdRun.exe
MSASCui.exe
ntmSCMon.exe
ntmConfig.exe
gwupdate1.exe
gwupdate.exe
ntmurl.exe
tskShield.exe
gwtray.exe
DTLaunch.exe
DTShell.aye
DTRunSC.exe
DTUpdSrv.aye
DTUpdate.aye
DTRTSrv.aye
DTPatch.aye
DTLocalHost.aye
DTHost.aye
DTAgent.aye
Doctor.aye
NVCSvcMgr.npc
NToolsUpdater.exe
nsvmon.npc
NVC.npc
NVCAgent.npc
NVCOpt.npc
Nsvmon.npc
Nsavsvc.npc
NaverAgent.exe
NaverAdminAPISvc.exe
NToolsUpdaterLauncher.exe
NVCUpgrader.exe
WscTsk.exe
V3Proxy.ahn
V3Up.exe
V3Trust.exe
V3Svc.exe
V3SP.exe
V3Regi.exe
V3QuaVw.exe
V3PScan.exe
V3Main.exe
V3Exec.exe
V3Delete.exe
V3Cr.exe
V3Clnup.exe
V3Cfg.exe
V3Au.exe
V3APRule.exe
V3APKMD.exe
restoreu.exe
MUpdate2.exe
AhnRpt.exe
V3Medic.exe
V3LRun.exe
V3LNetDn.exe
V3Light.exe
V3LExec.exe
SgSvc.exe
V3LSvc.exe
AYPatch.aye
AYCon.exe
AYLaunch.exe
install.aye
ESTCM.exe
AYTask.aye
AYShell.aye
AYRunSC.exe
AYHost.aye
AYUpdSrv.aye
AYRTSrv.aye
AYAgent.aye
AlYac.aye
Pretty much lame stuff, especially 100500 wcsicmp and the way how it lookups original
NtOpenProcess,
NtTerminateProcess,
NtQuerySystemInformation addresses which is complete facepalm. This lolkit will only work on Windows XP, Vista and 7 due to hardcoded index values of
NtOpenProcess,
NtTerminateProcess and
NtQuerySystemInformation. Yet another Korean? gamers spying lolkit.
MBR copy btw located in the driver.