Author: Nathaniel Gregory Ragasa   

 

Trojan.Win32.Crypt(IKARUS), Win32/Emotet.CQ trojan(NOD32)

 PLATFORM:

Windows

 OVER ALL RISK RATING:
 DAMAGE POTENTIAL::
 DISTRIBUTION POTENTIAL::
 REPORTED INFECTION:
 INFORMATION EXPOSURE:
Low
Medium
High
Critical

  • Threat Type:
    Trojan Spy

  • Destructiveness:
    No

  • Encrypted:
     

  • In the wild::
    Yes

  OVERVIEW

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File size: 1,000,448 bytes
File type: DLL
Memory resident: No

Detalles de entrada

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Instalación

Este malware infiltra una copia de sí mismo en las carpetas siguientes con diferentes nombres de archivo:

  • %System%\{Random Characters}\{Random Characters}.{Random Characters}

(Nota: %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

)

Agrega los procesos siguientes:

  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",{Random Characters}
  • %System%\rundll32.exe "%System%\{Random Characters}\{Random Characters}.{Random Characters}",DllRegisterServer

(Nota: %System% es la carpeta del sistema de Windows, que en el caso de Windows 98 y ME suele estar en C:\Windows\System, en el caso de Windows NT y 2000 en C:\WINNT\System32 y en el caso de Windows 2000(32-bit), XP, Server 2003(32-bit), Vista, 7, 8, 8.1, 2008(64-bit), 2012(64bit) y 10(64-bit) en C:\Windows\System32).

)

Otros detalles

It connects to the following possibly malicious URL:

  • http://{BLOCKED}.{BLOCKED}.201.2
  • http://{BLOCKED}.{BLOCKED}.201.4
  • http://{BLOCKED}.{BLOCKED}.214.46
  • http://{BLOCKED}.{BLOCKED}.225.142
  • http://{BLOCKED}.{BLOCKED}.117.186
  • http://{BLOCKED}.{BLOCKED}.255.201
  • http://{BLOCKED}.{BLOCKED}.188.93
  • http://{BLOCKED}.{BLOCKED}.24.231
  • http://{BLOCKED}.{BLOCKED}.72.26
  • http://{BLOCKED}.{BLOCKED}.186.49
  • http://{BLOCKED}.{BLOCKED}.186.55
  • http://{BLOCKED}.{BLOCKED}.222.101
  • http://{BLOCKED}.{BLOCKED}.59.82
  • http://{BLOCKED}.{BLOCKED}.230.105
  • http://{BLOCKED}.{BLOCKED}.102.168
  • http://{BLOCKED}.{BLOCKED}.50.39
  • http://{BLOCKED}.{BLOCKED}.175.63
  • http://{BLOCKED}.{BLOCKED}.99.3
  • http://{BLOCKED}.{BLOCKED}.193.249
  • http://{BLOCKED}.{BLOCKED}.106.96
  • http://{BLOCKED}.{BLOCKED}.83.165
  • http://{BLOCKED}.{BLOCKED}.147.66
  • http://{BLOCKED}.{BLOCKED}.82.211
  • http://{BLOCKED}.{BLOCKED}.71.210
  • http://{BLOCKED}.{BLOCKED}.56.148
  • http://{BLOCKED}.{BLOCKED}.133.20
  • http://{BLOCKED}.{BLOCKED}.134.35
  • http://{BLOCKED}.{BLOCKED}.109.124
  • http://{BLOCKED}.{BLOCKED}.84.195
  • http://{BLOCKED}.{BLOCKED}.17.99
  • http://{BLOCKED}.{BLOCKED}.5.209
  • http://{BLOCKED}.{BLOCKED}.56.116
  • http://{BLOCKED}.{BLOCKED}.98.99
  • http://{BLOCKED}.{BLOCKED}.226.206
  • http://{BLOCKED}.{BLOCKED}.143.207
  • http://{BLOCKED}.{BLOCKED}.204.126
  • http://{BLOCKED}.{BLOCKED}.108.46
  • http://{BLOCKED}.{BLOCKED}.115.99
  • http://{BLOCKED}.{BLOCKED}.135.203
  • http://{BLOCKED}.{BLOCKED}.114.231
  • http://{BLOCKED}.{BLOCKED}.232.124
  • http://{BLOCKED}.{BLOCKED}.222.11
  • http://{BLOCKED}.{BLOCKED}.54.215
  • http://{BLOCKED}.{BLOCKED}.140.238
  • http://{BLOCKED}.{BLOCKED}.42.236
  • http://{BLOCKED}.{BLOCKED}.212.216
  • http://{BLOCKED}.{BLOCKED}.236.90
  • http://{BLOCKED}.{BLOCKED}.152.127