TROJ_INJECTOR.PON


 PLATFORM:

Windows

 OVERALL RISK RATING:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

211,968 bytes

File Type:

EXE

Initial Samples Received Date:

30 Nov 2017

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan drops the following files:

  • %User Temp%\upd{random alphanumeric characters}.bat - Used to delete the initial copy of itself
  • %User Temp%\upd{random alphanumeric characters}.tmp
  • %Application Data%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Windows Explorer.ocx
  • %Application Data%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Mail Recipient.yhy
  • %Application Data%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\Notepad.tee

It drops the following copies of itself into the affected system:

  • %User Temp%\upd{random alphanumeric characters}.exe
  • %Application Data%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\_imagingmath.exe

Autostart Technique

This Trojan adds the following registry entries to enable its automatic execution at every system startup:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
_imagingmath.exe = "%Application Data%\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\_imagingmath.exe"

Other System Modifications

This Trojan adds the following registry keys:

HKEY_CURRENT_USER\Software\Microsoft\
F12
Rati =

HKEY_CURRENT_USER\Software\Microsoft\
F12
Osofhatun =

HKEY_CURRENT_USER\Software\Microsoft\
F12
Muhiyp =

Other Details

This Trojan connects to the following possibly malicious URL:

  • https://salb{BLOCKED}n.xyz/{BLOCKED}ulceroid.dat