Dyre.L a malware tries to register itself as Google Update Service to avoid detection.
The Dell SonicWall Threats Research team observed reports of a Dyre bot family named GAV: Dyre.L actively spreading in the wild. We recently released GAV: Dyre.E which is uses I2P (Invisible Internet Project) for C&C communications and also uses self-signed SSL certificate for C&C communications. The new version of Dyre tries to register itself as Google Update Service to avoid detection by Systems administrators.
The Malware uses the following icons:
The Malware adds the following files to the system:
C:WINDOWStSfxwnnGqbYvrba.exe [Random Service Name ]
%systemroot%system32configsystemprofileApplication Datanw9vbe8cb5.dll [ Data Log ]
The Malware adds the following keys to the Windows registry [As a Service] to ensure persistence upon reboot:
The file tSfxwnnGqbYvrba.exe registered as services on win32 subsystem, after next restart the malware uses an injected Svchost.exe to send packets to its own C&C Server and after some time it terminates its own process.
Dyre tries to enumerate files on the target system, after Malware retrieve list for exe files it saves on % systemroot%system32configsystemprofileApplication Datanw9vbe8cb5.dll file and start to encrypt it with its own format, here is an example:
Here is decrypted information grabbed by malware:
Command and Control (C&C) Traffic
Dyre has the C&C communication over HTTP & SSL. It sends requests to statically defined IP/Domains on a regular basis. The Malware uses self- signed SSL certificate for C&C communications.
The malware sends a HTTP request to the C&C server which contains information such as the campaign it belongs to, the infected machines computer name, operating system version, here is an example:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:
GAV: Dyre.L ( Trojan )