on 11-Nov-2015 10:58
Dyre malware requires little introduction as it had been the focus of many publications and it is a well-known threat in the financial malware world.
One of the reasons for it being so infamous is the frequent changes the authors incorporate in the code.
Recently, my colleague Gal Shilo and I noticed a few minor changes in Dyre’s configuration file.
This triggered research that uncovered a significant evolution in the malware’s behavior.
While Windows 10 is gaining momentum, Dyre creators don't miss the opportunity to target the early adopters by also infecting the Edge browser that ships with this OS.
This is an example of the browser injection routine:
Dyre uses a windows pipe for inter-process communication, passing commands from the main module it injects into the “windows explorer” process to other processes. The commands are passed both to browsers launched by the user and stealthy worker-processes launched by the malware itself.
In the new sample, most of the commands discussed in previous F5 research have been replaced and a few new ones have been added, along with new functionality.
Here is a list of new features designed to add protection from removal and detection:
Although the purpose was to make the pipe harder to detect because it is unique per machine, the opposite was accomplished as the name can now be predicted for each machine.
Some of the spotted vendors include: Avira, AVG, Malwarebytes, Fortinet and Trend Micro.
Looking for the product path in the registry:
We conclude from the addition of these features that the authors of the malware strive to improve their resilience against anti-viruses, even at the cost of being more conspicuous. They also wish to keep the malware up-to-date with current OS releases in order to be “compatible” with as many victims as possible. There is little doubt that the frequent updating will continue, as the wicked require very little rest.
Sample MD5: 5f464d1ad3c63b4ab84092d2c1783151