Bublik, CyberGate, and Game of Thrones

By
The Dell SonicWall Threats Research Team recently encountered a family of .NET malware that eventually drops a CyberGate remote access trojan. While it is unclear what the initial vector of infection is, it appears that the malware attempts to pass itself off as an Adobe installer, and even goes so far as to drop and execute a legitimate copy of the Adobe Bootstrapper. This seems like an effective decoy because the Bootstrapper will always encounter an error due to missing installation files before directing the user to the official Adobe site for a support download.
Adobe Installer Error

Indicators of Compromise

In this instance, the malware has the hardcoded ID of 04W47BG81GO688, so multiple mutexes and file paths include this string as seen below.

Mutex Indicators
    Creates mutex: Sessions1BaseNamedObjects4W47BG81GO688
    Creates mutex: Sessions1BaseNamedObjects4W47BG81GO688[USERNAME]15
    Creates mutex: Sessions1BaseNamedObjectsxXx_key_xXx
    Creates mutex: Sessions1BaseNamedObjects4W47BG81GO688_SAIR
    Creates mutex: Sessions1BaseNamedObjects4W47BG81GO688_RESTART

File Indicators
    Creates: %APPDATA%LocalTemppMfL.exe
    Creates: %APPDATA%LocalTempBISy.exe
    Creates: %APPDATA%winini.exe
    Creates: %APPDATA%LocalTempPDApp.log
    Creates: %APPDATA%LocalTempcvtres.exe
    Creates: %APPDATA%Roaming945109AB
    Creates: %APPDATA%Roaming945109ABak.tmp
    Creates: %APPDATA%Roaming[USERNAME]-wchelper.dll
    Creates: %APPDATA%LocalTemp[USERNAME]7
    Creates: %APPDATA%LocalTemp[USERNAME]8
    Creates: C:WindowsUpdatevbc.exe
    Creates: %APPDATA%LocalTemp[USERNAME]2.txt

Registry Indicators

    Creates key: HKLMsoftwaremicrosoftactive setupinstalled components{odks44qa-12l5-c1lw-tgc7-2430ij2b12a6}StubPath
Network Indicators
    DNS query: laki.no-ip.org
    DNS response: laki.no-ip.org ⇒ 176.14.66.219
    Connects to: 176.14.66.219:3333

Infection Cycle

Infection Flow

.NET Stage Analysis