THIS REPOSITORY CONTAINS MALWARES!!!! DON'T DOWNLOAD OR RUN ANYTHING IN IT UNLESS YOU CLEARLY UNDERSTAND WHAT YOU ARE DOING!!!!
DCM is a Trojan Spy-ware dedicated to APT attack of specific targets. It's first disclosed by Tecent's security team on Freebuf.[1] It's developed by Chinese agency which rumored to be some g0v related people. A self-claimed author member "DcmTeamMember" on V2EX posted the insights about the creation of the virus.[2]
This repository contains some samples of the DCM virus collected from various online virus sharing channels. The naming is the file's MD5 hash. If the original file is packed (usually with UPX) then an unpacked version is provided for convinence.
Report: http://r.virscan.org/report/fee007c110eeb4dfdba508120ab6bef4
This is the exact version used in the analysis article on Freebuf. So
I will personally refer it as DCM-0
.
The resource files in the unpacked executable is encrypted with simple
XOR algorithm. (implemented in sub_4011C0
) I added a decryption
script for your convinence. The extracted and decrypted resource files
are also included.
Report: https://totalhash.cymru.com/analysis/?fbbbc68a4b56c9c70487753be3c26f4293e79ec9
This version has the same program structure as DCM-0
. Even the
resource files are encrypted with the same algorithm. However the binary
seems to be a slightly larger than DCM-0
thus I would guess it's an
upgraded version to DCM-0
.
Report: https://totalhash.cymru.com/analysis/?30161f778c28443b40b5cef76dc977b0c2c4c352
This version is another slightly changed DCM-0
. It has less behaviour
characteristics on the report. I will categorize these 5 bin resources
silimar to DCM-0
samples as DCM-Δ
.
Report: https://totalhash.cymru.com/analysis/?823daa3fe3c32c32573b0317b488db901a191018
This version is basically the same as DCM-0
with some minor changes.
I also contains 5 bin resources, thus is a DCM-Δ
.
Report: https://totalhash.cymru.com/analysis/?6f31aa2d01c5a67744fa8688933ae31dfc5a9c0d
This sample is reported to create mutex named Global\I_AM_EXIST!!
,
which is an identifier of the DCM behaviour. However it lacks of any
other behaviour that a typical DCM virus should has. Therefore I think
it's actually an early or experimental version of DCM-0
. It even doesn't
encrypt its resource files.
Report: https://home.mcafee.com/virusinfo/virusprofile.aspx?key=2236045
I believe it's an early version DCM virus due to the small file size
with only two bin resources, and lack of most of the behaviour
characteristics of DCM-0
. However, it does generate
%TEMP%\{E53B9A13-F4C6-4d78-9755-65C029E88F02}\soft.prog
and other
core files that we can be certain that it's a variation of DCM.
Unlike 82304a0a2ab419f657a4e9d8319c1e99
, this version uses XOR encryption
for its resource files, but is slightly different than the algorithm used
in DCM-0
in terms of parameters. Thus I think it's a development upgrade
of 82304a0a2ab419f657a4e9d8319c1e99
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
This one seems to be a further upgrade to 1b2f0cbd3f048ee9f3e9885d4076ce8c
since they has the same bin resource encryption algorithm, but this one
has one more bin resource file implementing LSP hijacking.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
This version is similar to 8b32eef5829507e469f294999a28ff23
since it
also contains 3 bin resources and uses the same encryption algorithm.
This version is similar to 8b32eef5829507e469f294999a28ff23
and
305e64099e346cad595c08635a5558b6
since they both contain 3 bin
resources and use the same encryption algorithm.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
This version is a bit strange since it lack of one x64 core DLL bin
resource file (bin/146) but contains other bin resources of DCM-0
,
but it uses the encryption algorithm from 1b2f0cbd3f048ee9f3e9885d4076ce8c
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.
Yet another DCM-Δ
.