Nytro Posted January 23, 2015 Report Posted January 23, 2015 Dyre Infection Analysis by Alexander Hanel2014/11/24Version 1.0alexander.hanel@gmail.comExecutive SummaryIntroductionFamily NamePropagationSample AnalyzedInstallationStage 1stage 2Stage 3Stage 4Stage 5Stage 6Stage 7General Details and FunctionalityPersistenceRegistryServiceRun KeyDropped FilesServicePipesMutexFunctionality OverviewEnumerating processesProcess InjectionHost IP RetrievalVNCCommands & ConfigurationsCommands & ConfigurationsError CodesHooksFireFox HooksInternet Explorer HooksChrome HooksAntiDetectionfunctionalityDisabling RapportGPCommand and ControlThird Party ResourcesURLs & IPsNetwork Traffic PatternsAppendix:StringsStage 6 DyreStage 7 InjectedProcessThird Party AnalysisExecutive SummaryThis document is an analysis of the Dyre banking malware. It is intended to aid inunderstanding how Dyre executes and interact with the operating system. The targetedaudience is malware analyst, reverse engineers, system administrators, incident respondersand forensic investigators. Hopefully an individual investigating an incident could use thisdocument to determine if the infection is Dyre or not.IntroductionDyre is banking trojan that first was first seen in June of 2014. In terms of banking malwarethe family is rather recent. Most organizations and email providers have been hit with a spamcampaigns that either links to an exploit kit that drops Drye or have been sent an email with azip attachment that contains a Dyre executable. This document cover features of the Dyrethat I found interesting. Due to the size of the code not all features are covered. The sample Ioriginally started with was an older sample. Newer samples that dropped a service crashed inDownload: https://bytebucket.org/Alexander_Hanel/papers/raw/1c41fd1ed30cdd060d18ceddb2d2e52db5134e45/Dyre-Analysis.pdf Quote