A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #21852  by Xylitol
 Fri Jan 03, 2014 5:49 pm
Attachments
infected
(30.31 KiB) Downloaded 74 times
infected
(197.68 KiB) Downloaded 77 times
infected
(106.75 KiB) Downloaded 78 times
 #21854  by patriq
 Fri Jan 03, 2014 10:15 pm
Xylitol wrote:Targeting World of Warcraft people.
http://us.battle.net/wow/en/forum/topic ... 892?page=1

Troj.WowSpy-A:
https://www.virustotal.com/en/file/850d ... 388771269/
I cant unpack these with UPX -d .. something I'm doing wrong?
Code: Select all
        File size         Ratio      Format      Name
   --------------------   ------   -----------   -----------
upx: wow_1031_v2_done!.exe: NotPackedException: not packed by UPX

        File size         Ratio      Format      Name
   --------------------   ------   -----------   -----------
upx: DOMAIN EXE.EXE: NotPackedException: not packed by UPX
but I can see sections UPX0 and UPX1 - dead giveaway ?

Does this run without WoW installed? I don't see anything checking the registry..and error messages on Malwr.
How are victims targeted? (Maybe BitTorrent, as a name looks to be a WoW related file "wow_1031_v2" ?? )

Anyone seen any C&C traffic for this campaign?
 #21862  by Xartrick
 Sat Jan 04, 2014 4:37 pm
patriq wrote:I cant unpack these with UPX -d .. something I'm doing wrong?
Don't bother with the loader, you can directly look into w_win.dll and w_64.dll, they contains the full payload.
patriq wrote:Does this run without WoW installed? I don't see anything checking the registry..and error messages on Malwr.
It will hook wow.exe (World of Warcraft) if present, but also target iexplorer.exe (Internet Explorer) as well.
The DLL add an entry into registry to be run at every startup.
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Disker => rundll32.exe X:\[..]\w_win.dll,DW
 #21863  by patriq
 Sat Jan 04, 2014 9:48 pm
Win32:Virut wrote:
patriq wrote:How are victims targeted? (Maybe BitTorrent, as a name looks to be a WoW related file "wow_1031_v2" ?? )
It is dropped by:

_hxxp://www.curse.pw/
_hxxp://www.curse.pw/setup.exe

(the links are dead now)

Another file: https://www.virustotal.com/file/6b654c5 ... 388824597/
Cool, thanks. The links seem fine to me?

There is an advert on the page about this "addon manager" for gamers. I dunno, not very interesting.

false positive?
 #21864  by patriq
 Sat Jan 04, 2014 9:50 pm
Xartrick wrote:
patriq wrote:I cant unpack these with UPX -d .. something I'm doing wrong?
Don't bother with the loader, you can directly look into w_win.dll and w_64.dll, they contains the full payload.
patriq wrote:Does this run without WoW installed? I don't see anything checking the registry..and error messages on Malwr.
It will hook wow.exe (World of Warcraft) if present, but also target iexplorer.exe (Internet Explorer) as well.
The DLL add an entry into registry to be run at every startup.
Code: Select all
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Disker => rundll32.exe X:\[..]\w_win.dll,DW
Check. Thanks.

(also, did you really register in 2011 and just post first right now? )
 #21865  by Xartrick
 Sat Jan 04, 2014 11:48 pm
patriq wrote:Check. Thanks.

(also, did you really register in 2011 and just post first right now? )
I always get an interest into malware, but never go deeper.
 #21867  by rinn
 Sun Jan 05, 2014 8:52 am
Hello.

It's really UPX. Just a bit scrambled. In attach unpacked, all interesting dll's inside in rsrc section. Even if upx -d failed you still can unpack it manually.

Best Regards,
-rin
patriq wrote:I cant unpack these with UPX -d .. something I'm doing wrong?
Code: Select all
        File size         Ratio      Format      Name
   --------------------   ------   -----------   -----------
upx: wow_1031_v2_done!.exe: NotPackedException: not packed by UPX

        File size         Ratio      Format      Name
   --------------------   ------   -----------   -----------
upx: DOMAIN EXE.EXE: NotPackedException: not packed by UPX
but I can see sections UPX0 and UPX1 - dead giveaway ?
Attachments
infected
(198.88 KiB) Downloaded 56 times
 #21869  by Xartrick
 Sun Jan 05, 2014 10:49 am
rinn wrote: It's really UPX. Just a bit scrambled. In attach unpacked, all interesting dll's inside in rsrc section. Even if upx -d failed you still can unpack it manually.
Did you figure what makes upx -d failing?