
SonicWALL UTM Research team received reports of a new PS3 Jailbreak Trojan being distributed in the wild. This Trojan is actually a new variant of Trojan Spatet packaged together with a PS3 Jailbreak Tool. This tool purportedly will allow gamers to use their PS3 console without the games original disc. However, users who download this tool get infected by a Trojan Backdoor that steals information from their system.
The release of this Trojan comes after a real PS3 Jailbreak USB Stick has been released and is currently gaining popularity among PS3 gamers.
Arrival & Installation:
This trojan may arrive in the system after being downloaded from the following URL:
The installer of this Trojan looks like this:
The PS3 Jailbreak tool looks like this:
As the user installs the PS3 Jailbreak tool, it will also install the following:
It will create Mutex to ensure that only one instance of the application runs in the system:
(Note: %Temp% is the Temporary Folder, which is usally C:Documents and Settings{User}Local SettingsTemp%System% is the Windows System folder, which is usually C:WindowsSystem32)
Registry Changes:
It adds the following registry entries to ensure that the dropped copy of the malware starts on every system reboot:
It adds the following registry entries as part of its installation:
Anti-Debugging Technique:
This Trojan employs the following Anti-Debugging/Anti-Analysis technique before it proceeds execution:
Information Stealing:
It collects information from the following:
After it collects information, it will send them to a remote server through HTTP protocol.
Command & Control (C&C) Server connection:
It tries to connect to a remote server to receive further instruction and to send collected information:
SonicWALL Gateway AntiVirus provides protection against this worm via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News