ETUMBOT
Dynamer, Specfix
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet, Dropped by other malware
ETUMBOT is a malware family of Trojans, which has the capability to drop and execute its component file. This component file is a backdoor which when executed, can perform various commands from a malicious user, thus effectively compromising the system.
ETUMBOT variants have the capability to drop a non-malicious .DOC file which is opened afterwards to hide its malicious routine from the user.
TECHNICAL DETAILS
Yes
Drops files
Installation
This Trojan drops and executes the following files:
- %Application Data%\Locations\conime.exe
- %User Temp%\~DS5D64.doc
- %User Temp%\wmspd.dll
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
It drops the following copies of itself into the affected system:
- %User Temp%\wuauclt.exe
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
It creates the following folders:
- %Application Data%\Locations
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
Other System Modifications
This Trojan adds the following registry entries:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer\Run
conime = "%User Temp%\wuauclt.exe"
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}t.{BLOCKED}ed.net/image/iwp8L6aVlvUc5v6SxfNLvmYtTwymKNUxphDfWEIGgimzbZJE5iHNHMY-.jpg
- http://{BLOCKED}t.{BLOCKED}ed.net/history/iwp8L6Y-.asp
- http://{BLOCKED}t.{BLOCKED}ed.net/home/index.asp?typeid={random number}
- http://{BLOCKED}t.{BLOCKED}ed.net/history/mBp7I9u+qNJFs9bWwg--.asp
- http://{BLOCKED}t.{BLOCKED}ed.net/tech/s.asp?m={random characters}