BKDR_CIMUZ
Insebro, BHO
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
The malware family CIMUZ is used to install a Browser Helper Object (BHO) in order to steal passwords, login credentials and financial information.
This spyware registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating registry keys/entries.
TECHNICAL DETAILS
Yes
Steals information
Installation
This spyware drops the following files:
- %System%\iebho.dll
(Note: %System% is the Windows system folder, which is usually C:\Windows\System32.)
Autostart Technique
This spyware registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating the following registry key(s)/entry(ies):
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Explorer\
Browser Helper Objects\{D032570A-5F63-4812-A094-87D007C23012}
HKEY_CURRENT_USER\Software\AppDataLow
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url = "http://{BLOCKED}ckupforu.com/dgabbana/"
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url2 = “http://{BLOCKED}ckupforu.com/dgabbana/"
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url = "http://{BLOCKED}forsafedd.com/pickit/”
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url2 = "http://{BLOCKED}forsafedd.com/pickit/”
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url = "http://{BLOCKED}ckupforu.com/gabbanauk/”
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url2 = "http://{BLOCKED}ckupforu.com/gabbanauk/”
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url = "http://{BLOCKED}evinovat.com/pteradaptelfan/"
HKEY_CURRENT_USER\Software\AppDataLow\
BHOinit
url2 = "http://{BLOCKED}evinovat.com/pteradaptelfan/"
Other System Modifications
This spyware adds the following registry entries as part of its installation routine:
HKEY_CLASSES_ROOT\CLSID\{D032570A-5F63-4812-A094-87D007C23012}\
InprocServer32
@ = "%System%\iebho.dll"
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{D032570A-5F63-4812-A094-87D007C23012}\InprocServer32
@ = "%System%\iebho.dll"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Internet Explorer\Main
Enable Browser Extensions = "yes"
It adds the following registry keys as part of its installation routine:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\
CLSID\{D032570A-5F63-4812-A094-87D007C23012}
HKEY_CLASSES_ROOT\CLSID\{D032570A-5F63-4812-A094-87D007C23012}
Other Details
This spyware connects to the following possibly malicious URL:
- http://{BLOCKED}ickupforu.com/dgabbana/
- http://{BLOCKED}ickupforu.com/gabbanauk/
- http://{BLOCKED}iickupforu.com/dgabbana/
- http://{BLOCKED}iickupforu.com/gabbanauk/
- http://{BLOCKED}upforsafedd.com/pickit/
- http://{BLOCKED}pforsafedd.com/pickit/
- http://{BLOCKED}nevinovat.com/pteradaptelfan/
- http://{BLOCKED}evinovat.com/pteradaptelfan/