VBS.Dunihi
Dunihi is a family of worms that can steal information, download and install additional files onto the system and/or install a backdoor component.
Last updated
Was this helpful?
Dunihi is a family of worms that can steal information, download and install additional files onto the system and/or install a backdoor component.
Last updated
Was this helpful?
Once the device is infected, under the registry key of Roaming, Startup are a vbs file called "My S*X PHOTO". The code of that file looks some like the image below. The full code are .
The first instruction "on error resume next" basically means if the code have some error only keep going. Then have 2 instruction that are the core to defuse the script:
chrw(): Return the string character for ChrCode (Unicode/DBCS). Example chrw(105) = i. The code has a lot of this instruction with different value that are the product of some operation like subtraction, addition, multiplication and division. With & concatenate.
Mid(): MID(string, start [,length]). Returns the text string which is a substring of a larger string (String). Example:
In the table below i put the IOCs from the sample.
Type
Value
URL
glauco69.no-ip.org:1188
SHA2
A9D0EEE033C2E2B9DD19184CCE8C5F987697BDA7454D72900AFC8D25F7C81B5E
Hope you enjoy the Analysis and feel free to get in touch with me if you have questions or suggestions.
Before we work all the operations we have a outcome like the code block below. The full code in clear are . With this the worm wants to list the process and search for wscript to the code in hexadecimal of the variable s.
The code stored in the variable s are in hexadecimal and after make the recipe with cyberchef we outcome the code below. In this part the worm want to dowload a file from the url "glauco69.no-ip.org:1188", a reference for this is the code shared by Here are a extract of the code: