BKDR_PLUGX.DB
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Backdoor
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
262,144 bytes
EXE
Yes
26 Sep 2013
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This backdoor drops the following files:
- %All Users Profile%\SxS\bug.log
(Note: %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.)
It creates the following folders:
- %All Users Profile%\SxS
(Note: %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.)
Autostart Technique
This backdoor adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
iTurnsPlatform service = ""{malware path and file name}""
Other System Modifications
This backdoor adds the following registry keys:
HKEY_CLASSES_ROOT\MJ
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\
Master Jobs
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\
Master Jobs\Recent File List
HKEY_CURRENT_USER\Software\Local AppWizard-Generated Applications\
Master Jobs\Settings
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
User Agent
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
User Agent\Post Platform
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
5.0\User Agent
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
5.0\User Agent\Post Platform
It adds the following registry entries:
HKEY_CLASSES_ROOT\MJ
CLSID = "{random value}"
Other Details
This backdoor connects to the following possibly malicious URL:
- http://{BLOCKED}b.{BLOCKED}y.com/update?id=001a30f0
- http://{BLOCKED}b.{BLOCKED}y.com:8080/update?id=001a30f0
- http://{BLOCKED}b.{BLOCKED}y.com:3128/update?id=001a30f0