Dorkbot Malware From 2012 Resurfaces and Becomes Major Threat - How to, Technology and PC Security Forum | SensorsTechForum.com

Dorkbot Malware From 2012 Resurfaces and Becomes Major Threat

Dorkbot, a 6-yer old Banking Malware has resurfaced in the wild to become a major threat, according to recent reports.

The Dorkbot banking malware reportedly started it’s malicious activity back in 2012 but now it seems as if this virus has started to attack banks once again. This updated version of Dorkbot was ranked second in the world back in 2012 and according to Check Point’s report it may now be back to wreak havoc and cause damage to banking institutions on a major level.




What Is Dorkbot?

Dorkbot is a banking malware which was used by hackers to target Skype accounts plus Facebook and Twitter accounts as well. The malware has been reported to try to trick victims to download an archive which contained a message in it, called “Is this your new profile pic?”. The .zip attachment was reportedly opened by the victim and then the malware locks the victimized computer. But this is not all that it does as the Dorkbot virus locks the malware into a botnet infection and the contacts of the victims were sent to the malicious archive.

The virus has evolved in a new updated variant which basically makes it an advanced RAT (Remote Access Trojan), which is configured to steal user information, such as:

  • Passwords and account names.
  • Keystrokes typed.
  • Logged in details when the user attempts to log in a banking site.

According to Check Point researchers, the malware was created to allow the attacker controlling it capabilities to perform remote code execution attacks with the primary idea to manually steal saved sensitive banking data and this means that the hacker may even be able to look into your computer’s history to check for passwords or data you have previously entered. The new injection capabilities, used by the malware has been detected behind the name Early Bird and it is basically a way of obfuscating the malware and allowing it to avoid being detected by any antivirus and security software.

The today’s variant of Dorkbot is quite more advanced and it impressed even analysts at CheckPoint, who also mentioned other well known banking infections in their report.

Dorkbot’s Activity

The original activity of Dorkbot drops multiple different files, in the %AppData% and %Temp% directories and among those files are worm infection files, that allow it to automatically spread across different machines. In addition to this, Dorkbot may also heavily modiy the Windows reigstry sub-keys, as Microsoft report in their analysis of the malware. The virus primarily attacks the Run and RunOnce sub-keys where it creates registry entries for all of it’s executable files to automatically run when you start Windows. The files are different for the different variants of Dorkbot, but primarily may be the following:

→ %APPDATA%\c731200
%APPDATA%\ScreenSaverPro.scr
%APPDATA%\temp.bin
%APPDATA%\update\explorer.exe
%APPDATA%\update\cleaner.exe
%APPDATA%\update\update.exe
%APPDATA%\windowsupdate\updater.exe
%APPDATA%\windowsupdate\live.exe
%APPDATA%\Windows Live\.exe, for example %APPDATA%\Windows Live\dkxjymgruw.exe
%TEMP%\Adobe\Reader_sl.exe
%TEMP%\c731200




The virus also has a folder, called RECYCLER, which uses all possible USB drives and registers them as a way to propagate into flash drives. The malware also uses backdoor access and control, so banks are advised to beware as it may spread in new and more clever ways.

Vencislav Krustev

Ventsislav has been covering the latest malware, software and newest tech developments at SensorsTechForum for 3 years now. He started out as a network administrator. Having graduated Marketing as well, Ventsislav also has passion for discovery of new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management and then Network Administration, he found his passion within cybersecrurity and is a strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...