Update April 20, 2012 Kimberly wrote an excellent analysis of this sample. Please go to
Stopmalvertising to read This is a "DarkMegie" rootkit sample, kindly donated by Hendrik Adrian. Just like described in the McAfee article "Darkmegi: This is Not the Rootkit You’re Looking For" by Craig Schmugar, it is anything but quiet and stealthy. In fact, it makes so many system changes that it is hard to cover it all in a quick post.
Indeed, it drops the rootkit components in drivers with the incredible padding to 25MB and generates a lot of traffic. Unfortunately, I did not have time yet to sort out the mess and purpose of all files that this malware creates so I am just posting it here along with sandbox results for you to analyze. If you write a detailed analysis, please share, I will link to.
Size: 77312
MD5: 6C8F9658A390C24A9F4551DC15063927
Download
Download (email me if you need the password scheme)
Download the modified / created files and analysis data
Download pcap
Malware system changes
Sample analysis -by Stopmalvertising
C:\Windows\System32\drivers\com32.sys 9728 4399b8a60977814197feae67c02a7ac2
C:\Windows\System32\drivers\RCX50E3.tmp 26224256 9f32c51764f579512810b7ab3de1a91aC:\Windows\System32\drivers\com32.sys 26224256 dd313b92f60bb66d3d613bc49c1ef35e
C:\Windows\System32\com32.dl 45056 25cfb72df8a30cbb7e6ee852bc31c50f
C:\Windows\System32\RCX5B11.tmp 31506432 2f00e0927c07bc44d9b79ccbe567f398
C:\Windows\System32\del043.bat 86 1a1e7855edc0afa6624080d60da8bf44
Traffic
It is as active as a click fraud or DDoS bot but does not fit these categories.
I am not quite sure what it is doing, please look and us know :)
Some of the traffic
[process 8] 65.55.253.27 192.168.254.192 GET
/c.gif?evt=br&rid=4571d83250544049bfc2ee88060f6bc8&exa=&cts=1334748967640&expac=&fk=W&gp=P&optkey=de
fault&clid=23A3C63D37E16EEA2397C50633E16E45&cp=def
ault&di=340&pi=7317&ps=95101&mk=en-us&pn=US+HPMSFT
3Wdefault&pid=6901517&su=http%3A%2F%2Fwww.msn.com%
2Fdefaultwpe3w.aspx&pageid=690151710&ce=1&hl=cplus
&cm=head%3Ecb1
/i/87/DEC3F3D671E6CC76B09340612A38.jpg
[process 8] 207.46.193.176 192.168.254.192 GET
[process 8] 207.46.193.176 192.168.254.192 none
3Focid%3Diehp&c9=&rn=1334748958175
/c.gif?udc=true&di=340&pi=7317&ps=95101&lng=en-us&
tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&ri
d=4571d83250544049bfc2ee88060f6bc8&rnd=13347489581
76&rf=&scr=1024x768
/c.gif?udc=true&di=340&pi=7317&ps=95101&lng=en-us&
tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&ri
d=4571d83250544049bfc2ee88060f6bc8&rnd=13347489581
76&rf=&scr=1024x768&MUID=23A3C63D37E16EEA2397C5063
3E16E45&cb=1cd1d576b2f13a0
/i/5E/4B835E56AC3C8535DB16275B4BAF4.jpg
/i/BB/756A1C963A72E4AFBC36501B512725.jpg
/i/E2/F757C6DFF15796123FA81CF7DCCF.jpg
/c.gif?udc=true&di=340&pi=7317&ps=95101&lng=en-us&
tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe3w.aspx&ri
d=4571d83250544049bfc2ee88060f6bc8&rnd=13347489581
76&rf=&scr=1024x768&RedC=c.msn.com&MXFR=23A3C63D37
[process 8] 65.55.239.146 192.168.254.192 none
/qsonhs.aspx?form=MSN005&q=
/CIS/77/000/000/000/028/440.swf?fd=www.msn.com
/CIS/18/000/000/000/024/175.jpg
Automatic scans
Virustotal
SHA256: a2c176ef3cc343194207e33acc19d5f8cb083a3c387a0404bd8f9d6bd29cfd6f
SHA1: c1af1fa6937097762824d0db039777ff35577727
MD5: 6c8f9658a390c24a9f4551dc15063927
File size: 75.5 KB ( 77312 bytes )
File name: DarkMegiSample
File type: Win32 EXE
Tags: yoda yodaprot
Detection ratio: 34 / 42
Analysis date: 2012-04-17 08:22:42 UTC ( 1 day, 3 hours ago )
More details
Antivirus Result Update
AhnLab-V3 Dropper/Rootkit.77312 20120417
AntiVir HEUR/Crypted 20120417
Antiy-AVL Trojan/Win32.Agent.gen 20120417
Avast Win32:Malware-gen 20120417
AVG PSW.Agent.ASED 20120417
BitDefender Trojan.Generic.KDV.503006 20120417
ByteHero - 20120417
CAT-QuickHeal TrojanSpy.Agent.bwtk 20120417
ClamAV PUA.Packed.YodaProt 20120417
Commtouch W32/Heuristic-210!Eldorado 20120417
Comodo TrojWare.Win32.TrojanDownloader.Agent.accn 20120417
DrWeb Trojan.PWS.Gamania.34539 20120417
Emsisoft Trojan.SuspectCRC!IK 20120417
eSafe Suspicious File 20120415
eTrust-Vet - 20120417
F-Prot W32/Heuristic-210!Eldorado 20120416
F-Secure Trojan.Generic.KDV.503006 20120417
Fortinet W32/Agent.BWTK!tr 20120417
GData Trojan.Generic.KDV.503006 20120417
Ikarus Trojan.SuspectCRC 20120417
Jiangmin TrojanSpy.Agent.uzc 20120417
K7AntiVirus Riskware 20120416
Kaspersky Trojan-Spy.Win32.Agent.bwtk 20120417
McAfee Artemis!6C8F9658A390 20120416
McAfee-GW-Edition - 20120417
Microsoft Trojan:Win32/Meredrop 20120417
NOD32 a variant of Win32/CsNowDown.C 20120417
Norman W32/Troj_Generic.ASBJ 20120416
nProtect Trojan/W32.Agent.77312.VC 20120417
Panda Generic Trojan 20120416
PCTools Downloader.Darkmegi 20120417
Sophos Mal/Packer 20120417
SUPERAntiSpyware - 20120402
Symantec Downloader.Darkmegi 20120417
TrendMicro Cryp_Yodap 20120417
TrendMicro-HouseCall Cryp_Yodap 20120417
VBA32 TrojanSpy.Agent.bwtk 20120416
VIPRE Trojan-Spy.Win32.Agent
Sample Mila =) MD5:6c8f9658a390c24a9f4551dc15063927
ReplyDeletecom32.sys
https://www.virustotal.com/file/c6483c1d66f9301dd531a732d739c70616ae486d62a0068a6e812c7f244fe295/analysis/1334825301/
MD5:5f8022f7fbe17cd815261bcb848b1d9e
com32.dll
https://www.virustotal.com/file/9b7fbdb740b772e4f87f5428a093dd31ff656163f8807a4cfc2bf418b93dce06/analysis/1334825338/
MD5:6e2297863d3d10ae40bd1c0499545f10
A CreateFile on C:\Windows\System32\com32.dll return (0x00000002) The system cannot find the file specified.
ReplyDeleteFindFirstFile seem to be working.
But a GetFileAttributes return FILE_ATTRIBUTE_ARCHIVE
It will not fool antirootkit that parse ntfs and compare with api.
:)