A new PbBot bootkit in study. Trojan:Win32/Urelas variant. Reported by @2gg in twitter, nature of infection is Korean game software, I got involved because of one of the CnC is in Japan. I am in assisting position of this case (not familiar well with the infection nature)
VT is
https://www.virustotal.com/file/5ca2471 ... 357307928/
It supposed to move my TestPC original MBR into 0×28 and also supposed to change the explorer into payload loader 32bit.
but somehow it crashed my TestPC in every reboot and every re-infection, made me difficult to compare MBR before and after infection. Tried it 3times.
Only I only got one shot for gathering all of the information below. Be free to help in any additional information.
The dropped payload (Trojan.Win32/Urelas bot client variant) uploaded here:
https://www.virustotal.com/file/80f25ff ... /analysis/
The sample upon executed, self copied & self deleted & run itself to modify MBR (still under confirmation),
and drop the spyware component to send info + etc data to remote host. The process goes like this:
The dropped trojan:
The batch file/command was used to erase the trace of original infector:
Code: Select all0x02EB64 0x02EB64 _uninsep.bat
: :
0x037840 0x037840 :Repeat
0x037849 0x037849 del "%s"
0x037853 0x037853 if exist "%s" goto Repeat
0x03786E 0x03786E rmdir "%s"
0x03787A 0x03787A del "%s"
The CnC of this infection are in two servers, Japan & S.Korea:
Suspected a local online card game mafia group is using it.
PoC:
This bootkit is targeting online games as auto-update installer to get the snapshot/capture screen of an infected gamers, game lists are:
Code: Select allbaduki.exe, RealBaduki.exe, highlow2.exe, LASPOKER.exe,
poker7.exe, Baduki.exe, HOOLA3.EXE, DuelPoker.exe,
FNF.EXE, i,e,, site:hanGame.co.jp
All of the callback to mothership are encrypted with "not" operator, which can be reversed as per below...
Also the config file, looks like a binary but can be decoded the same way:
I attached the analysis data (regshot/pcap/memdump, etc) here with password: infected.
If you want to seek more details about this sample I wrote official Japanese report in :
http://unixfreaxjp.blogspot.jp/2013/01/ ... 49164.html
(please use google translate to read, but for viewing the code better see japanese one)