Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Finding Dunihi By Houdini

*Updated on October/24/2014

Last weekend, I found Dunihi on the laptop of my brother in-law who works in a construction corporation. Dunihi is a RAT (Remote Access Tool) written in VBS (Visual Basic Script) that provides backdoor access to the infected system. We detect this as VBS/Dunihi. It may have arrived via infected USB drive, attachment in spammed email or malicious link / hack website.

It sends the following sensitive information from the infected computer to the C&C server:

      • Disk serial number
      • Computer name
      • User name
      • Operating system version
      • Installed antivirus products
      • All drive information
      • All file and folder attributes in a specified directory
      • All running processes

tl_files/assets_cyren/images/blog/dunihi_by_houdini_img1.png

Image 1: Snapshot of the information being sent to C&C server

The attacker may perform the following actions to the infected system remotely:

      • Run a command instructions in command shell
      • Download and execute files which may include other malware
      • Update or uninstall a copy of itself
      • Send a local file for upload
      • Delete a local file or folder
      • Terminate certain process

tl_files/assets_cyren/images/blog/dunihi_by_houdini_img2.png

Image 2: Code Snippet of Backdoor Functions

At the start of the Dunihi code, it shows the name of the malware author’s code-name and skype ID as well as the initial configuration for the C&C domain server as shown below.

tl_files/assets_cyren/images/blog/dunihi_by_houdini_img3.png

Image 3: Snapshot of the Skype IM @ houdini-fx

tl_files/assets_cyren/images/blog/dunihi_by_houdini_img4.png

Image 4: Code Snippet of the Initial Configuration

In the 2nd quarter of 2014, Microsoft filed a civil lawsuit against Vitalwerks (No-IP.com) and two foreign nationals to bring down two primary types, including the Bladabindi malware family which includes Dunihi. Later on, having reviewed the evidence, Microsoft determined that Vitalwerks had not knowingly supported or been involved with the subdomains used to support and distribute the malware. Microsoft revealed as well that the code-name “houdini-fx” belongs to an Algerian man named “Mohamed Benabdellah” based on his Twitter and Facebook account. Mohamed Benabhdellah was one of the two foreign nationals Microsoft filed a lawsuit against.

Keeping your antivirus definitions up to date and avoiding suspicious attachments, even if they are from someone you trust, will protect you from malware such as this.

*October/24/2014: Earlier version of this blog post read that Microsoft Corporation had worked with Vitalwerks Internet Solutions, LLC. to identify and disable the offending C&C domain server of the Dunihi malware.

You might also like

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the...