ETUMBOT


 ALIASES:

Dynamer, Specfix

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Downloaded from the Internet, Dropped by other malware


ETUMBOT is a malware family of Trojans, which has the capability to drop and execute its component file. This component file is a backdoor which when executed, can perform various commands from a malicious user, thus effectively compromising the system.

ETUMBOT variants have the capability to drop a non-malicious .DOC file which is opened afterwards to hide its malicious routine from the user.

  TECHNICAL DETAILS

Memory Resident:

Yes

Payload:

Drops files

Installation

This Trojan drops and executes the following files:

  • %Application Data%\Locations\conime.exe
  • %User Temp%\~DS5D64.doc
  • %User Temp%\wmspd.dll

(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

It drops the following copies of itself into the affected system:

  • %User Temp%\wuauclt.exe

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

It creates the following folders:

  • %Application Data%\Locations

(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)

Other System Modifications

This Trojan adds the following registry entries:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Policies\
Explorer\Run
conime = "%User Temp%\wuauclt.exe"

Other Details

This Trojan connects to the following possibly malicious URL:

  • http://{BLOCKED}t.{BLOCKED}ed.net/image/iwp8L6aVlvUc5v6SxfNLvmYtTwymKNUxphDfWEIGgimzbZJE5iHNHMY-.jpg
  • http://{BLOCKED}t.{BLOCKED}ed.net/history/iwp8L6Y-.asp
  • http://{BLOCKED}t.{BLOCKED}ed.net/home/index.asp?typeid={random number}
  • http://{BLOCKED}t.{BLOCKED}ed.net/history/mBp7I9u+qNJFs9bWwg--.asp
  • http://{BLOCKED}t.{BLOCKED}ed.net/tech/s.asp?m={random characters}