Analyse von: Nathaniel Gregory Ragasa   

 

Trojan.Win32.Crypt(IKARUS), Win32/Emotet.CQ trojan(NOD32)

 Plattform:

Windows

 Risikobewertung (gesamt):
 Schadenspotenzial::
 Verteilungspotenzial::
 reportedInfection:
 Trend Micro Lösungen:
Niedrig
Mittel
Hoch
Kritisch

  • Malware-Typ:
    Trojan Spy

  • Zerstrerisch?:
    Nein

  • Verschlsselt?:
     

  • In the wild::
    Ja

  Überblick

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  Technische Details

Dateigröße: 1,000,448 bytes
Dateityp: DLL
Speicherresiden: Nein

Übertragungsdetails

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

Schleust eine Kopie von sich selbst in folgende Ordner ein, wobei verschiedene Dateinamen verwendet werden:

  • %System%\{Random Characters}\{Random Characters}.{Random Characters}

(Hinweis: %System% ist der Windows Systemordner. Er lautet in der Regel C:\Windows\System unter Windows 98 und ME, C:\WINNT\System32 unter Windows NT und 2000 sowie C:\Windows\System32 unter Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) and 10(64-bit).)

Fügt die folgenden Prozesse hinzu:

  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",{Random Characters}
  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",DllRegisterServer

(Hinweis: %System% ist der Windows Systemordner. Er lautet in der Regel C:\Windows\System unter Windows 98 und ME, C:\WINNT\System32 unter Windows NT und 2000 sowie C:\Windows\System32 unter Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) and 10(64-bit).)

Andere Details

It connects to the following possibly malicious URL:

  • http://{BLOCKED}.{BLOCKED}.201.2
  • http://{BLOCKED}.{BLOCKED}.201.4
  • http://{BLOCKED}.{BLOCKED}.214.46
  • http://{BLOCKED}.{BLOCKED}.225.142
  • http://{BLOCKED}.{BLOCKED}.117.186
  • http://{BLOCKED}.{BLOCKED}.255.201
  • http://{BLOCKED}.{BLOCKED}.188.93
  • http://{BLOCKED}.{BLOCKED}.24.231
  • http://{BLOCKED}.{BLOCKED}.72.26
  • http://{BLOCKED}.{BLOCKED}.186.49
  • http://{BLOCKED}.{BLOCKED}.186.55
  • http://{BLOCKED}.{BLOCKED}.222.101
  • http://{BLOCKED}.{BLOCKED}.59.82
  • http://{BLOCKED}.{BLOCKED}.230.105
  • http://{BLOCKED}.{BLOCKED}.102.168
  • http://{BLOCKED}.{BLOCKED}.50.39
  • http://{BLOCKED}.{BLOCKED}.175.63
  • http://{BLOCKED}.{BLOCKED}.99.3
  • http://{BLOCKED}.{BLOCKED}.193.249
  • http://{BLOCKED}.{BLOCKED}.106.96
  • http://{BLOCKED}.{BLOCKED}.83.165
  • http://{BLOCKED}.{BLOCKED}.147.66
  • http://{BLOCKED}.{BLOCKED}.82.211
  • http://{BLOCKED}.{BLOCKED}.71.210
  • http://{BLOCKED}.{BLOCKED}.56.148
  • http://{BLOCKED}.{BLOCKED}.133.20
  • http://{BLOCKED}.{BLOCKED}.134.35
  • http://{BLOCKED}.{BLOCKED}.109.124
  • http://{BLOCKED}.{BLOCKED}.84.195
  • http://{BLOCKED}.{BLOCKED}.17.99
  • http://{BLOCKED}.{BLOCKED}.5.209
  • http://{BLOCKED}.{BLOCKED}.56.116
  • http://{BLOCKED}.{BLOCKED}.98.99
  • http://{BLOCKED}.{BLOCKED}.226.206
  • http://{BLOCKED}.{BLOCKED}.143.207
  • http://{BLOCKED}.{BLOCKED}.204.126
  • http://{BLOCKED}.{BLOCKED}.108.46
  • http://{BLOCKED}.{BLOCKED}.115.99
  • http://{BLOCKED}.{BLOCKED}.135.203
  • http://{BLOCKED}.{BLOCKED}.114.231
  • http://{BLOCKED}.{BLOCKED}.232.124
  • http://{BLOCKED}.{BLOCKED}.222.11
  • http://{BLOCKED}.{BLOCKED}.54.215
  • http://{BLOCKED}.{BLOCKED}.140.238
  • http://{BLOCKED}.{BLOCKED}.42.236
  • http://{BLOCKED}.{BLOCKED}.212.216
  • http://{BLOCKED}.{BLOCKED}.236.90
  • http://{BLOCKED}.{BLOCKED}.152.127