Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'dgroute' = 'rundll32.exe "<LS_APPDATA>\dgroute.dll",dgroute'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\dgroute] 'Startup' = 'dgroute'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\dgroute] 'DllName' = '<LS_APPDATA>\dgroute.dll'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\rundll32.exe' = '<SYSTEM32>\rundll32.exe:*:Enabled:rundll32...
Executes the following:
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Rundll32" dir=in action=allow protocol=any program="<SYSTEM32>\rundll32.exe"
- '<SYSTEM32>\netsh.exe' advfirewall firewall add rule name="Rundll32" dir=out action=allow protocol=any program="<SYSTEM32>\rundll32.exe"
- '<SYSTEM32>\rundll32.exe' "<LS_APPDATA>\dgroute.dll",dgroute <Full path to file>
Modifies file system:
Creates the following files:
- <LS_APPDATA>\dgroute.dll
Deletes itself.
Network activity:
Connects to:
- '21#.#8.206.78':443
UDP:
- DNS ASK e.###exdom.net