TROJ_SIREF64.SM

 Analysis by: Jasen Sumalapao

 ALIASES:

Trojan:Win64/Sirefef.M (Microsoft), Trojan.Zeroaccess (Symantec), ZeroAccess (NAI), Mal/ZAccess-AB (Sophos), Backdoor.Agent.ABEA (FSecure), Trojan.Win32.Generic!BT (Sunbelt), Backdoor.Agent.ABEA (BitDefender), Trojan.Zeroaccess-458 (Clamav), W64/Sirefef.W (Fortinet), Trojan.Win64 (Ikarus), Win64/Sirefef.W trojan (NOD32), Trojan ZAccess.KZH (Norman)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This is the Trend Micro detection for a 64-bit component of SIREFEF/ZEROACCESS family.

This Trojan may arrive bundled with malware packages as a malware component. It may arrive as a file that exports functions used by other malware. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It creates folders where it drops its files.

It requires its main component to successfully perform its intended routine.

  TECHNICAL DETAILS

File Size:

27,136 bytes

File Type:

DLL

Initial Samples Received Date:

19 Jun 2012

Arrival Details

This Trojan may arrive bundled with malware packages as a malware component.

It may arrive as a file that exports functions used by other malware.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It creates the following folders:

  • %User Profile%\Local Settings\Application Data\{CLSID}
  • %User Profile%\Local Settings\Application Data\{CLSID}\U - where the executable component is drop by the main component.
  • %User Profile%\Local Settings\Application Data\{CLSID}\@ - where the configuration component is drop by the main component.

(Note: %User Profile% is the current user's profile folder, which is usually C:\Windows\Profiles\{user name} on Windows 98 and ME, C:\WINNT\Profiles\{user name} on Windows NT, and C:\Documents and Settings\{user name} on Windows 2000, XP, and Server 2003.)

Backdoor Routine

This Trojan opens the following ports:

  • TCP 16465
  • UDP 1288

Other Details

This Trojan requires its main component to successfully perform its intended routine.