TROJ_FOSNIW
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security.
TECHNICAL DETAILS
Yes
Installation
This Trojan drops the following copies of itself into the affected system:
- %Application Data%\dgdu.exe
- %Application Data%\ewuj.exe
- %Application Data%\mbql.exe
- %Application Data%\mwvt.exe
- %Application Data%\oyse.exe
- %Application Data%\qlcm.exe
- %Application Data%\rint.exe
- %Application Data%\roxy.exe
- %Application Data%\tdkw.exe
- %Application Data%\vlbl.exe
- %Application Data%\vlcs.exe
- %Application Data%\xvsw.exe
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc7c9ccc891dac7da = "%Application Data%\xvsw.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc9d3dccc91dac7da = "%Application Data%\vlcs.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc9d3ddd391dac7da = "%Application Data%\vlbl.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcbdbd4c891dac7da = "%Application Data%\tdkw.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcdd0c7c691dac7da = "%Application Data%\roxy.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcdd6d1cb91dac7da = "%Application Data%\rint.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbced3dcd291dac7da = "%Application Data%\qlcm.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd0c6ccda91dac7da = "%Application Data%\oyse.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd2c8c9cb91dac7da = "%Application Data%\mwvt.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd2ddced391dac7da = "%Application Data%\mbql.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbdac8cad591dac7da = "%Application Data%\ewuj.exe"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbdbd8dbca91dac7da = "%Application Data%\dgdu.exe"
Other System Modifications
This Trojan adds the following registry entries as part of its installation routine:
HKEY_CURRENT_USER\Software\bfb396eaa9cf
prj = "6"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
ver = "1.0.0.114"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
DC = "4"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc7c9ccc891dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc9d3dccc91dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc9d3ddd391dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcbdbd4c891dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcdd0c7c691dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcdd6d1cb91dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbced3dcd291dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd0c6ccda91dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd2c8c9cb91dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd2ddced391dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbdac8cad591dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbdbd8dbca91dac7da"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
idt = "{date and time}"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "cln1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "co1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid2"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "kkr1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "lmcl4"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "tcz1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "up1"
HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "wst1"
It adds the following registry keys as part of its installation routine:
HKEY_CURRENT_USER\Software\bfb396eaa9cf
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=1&pid=up1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=cln1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=co1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=tcz1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=jmid1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=jmid2&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=lmcl4&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=5&pid=wst1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=6&pid=kkr1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=1&pid=up1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=cln1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=co1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=tcz1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=jmid1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=jmid2&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=lmcl4&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=5&pid=wst1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=6&pid=kkr1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/receive/r_autoidcnt.asp?mer_seq=1&realid=up1&cnt_type=e1&mac=000c29551670
- http://{BLOCKED}x.{BLOCKED}ys{number}.com/receive/r_autoidcnt.asp?mer_seq=1&realid=up1&cnt_type=e2&mac=000c29551670&logdata=MacTryCnt:0