TROJ_CVE20120158.VNA
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted: Yes
In the wild: Yes
OVERVIEW
This Trojan arrives as attachment to mass-mailed email messages.
It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
It takes advantage of certain vulnerabilities.
TECHNICAL DETAILS
2,585,277 bytes
MSG, DOC, RTF
No
21 Sep 2016
Arrival Details
This Trojan arrives as attachment to mass-mailed email messages.
Dropping Routine
This Trojan drops the following files:
- %User Temp%\RDVB.HJE
- %User Temp%\man.log
(Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.
Download Routine
This Trojan saves the files it downloads using the following names:
- %User Temp%\newfile.exe
(Note: %User Temp% is the user's temporary folder, where it usually is C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Local\Temp on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Other Details
This Trojan connects to the following possibly malicious URL:
- http://valarena.us/bins/newfile.exe
ip: 23.227.199.81:80
It takes advantage of the following vulnerabilities: