TROJ_BADUR.NIR
Trojan.Win32.Badur.hbhr (Kaspersky), Win32/TrojanDownloader.Delf.AIC.trojan (ESET)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
248,320 bytes
EXE
22 Mar 2014
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following file(s)/component(s):
- %Application Data%\Flash\Launch.bat
- %Application Data%\Flash\libgmp-3.dll
- %Application Data%\Flash\msvcp120.dll
- %Application Data%\Flash\msvcr120.dll
- %Application Data%\Flash\RapidPrime.exe
- %User Temp%\CNB_0275.exe
- %User Temp%\setup.dat
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
It creates the following folders:
- %Application Data%\Flash
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
Autostart Technique
This Trojan drops the following file(s) in the Windows User Startup folder to enable its automatic execution at every system startup:
- %User Startup%\flashsec.lnk
- %User Startup%\flashupdate.lnk
(Note: %User Startup% is the current user's Startup folder, which is usually C:\Windows\Profiles\{user name}\Start Menu\Programs\Startup on Windows 98 and ME, C:\WINNT\Profiles\{user name}\Start Menu\Programs\Startup on Windows NT, and C:\Documents and Settings\{User name}\Start Menu\Programs\Startup.)
Download Routine
This Trojan connects to the following URL(s) to download its component file(s):
- http://{BLOCKED}.{BLOCKED}.248.85/sgminer.exe
- http://{BLOCKED}.{BLOCKED}.248.85/firstsg.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/updatesg.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/flashsec.exe
- http://{BLOCKED}.{BLOCKED}.248.85/startsec.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/updatesec.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/alien_clicker.exe
- http://{BLOCKED}.{BLOCKED}.248.85/startcl.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/updatecl.vbs
- http://{BLOCKED}.{BLOCKED}.248.85/info.txt
- http://{BLOCKED}54hhdf.com/report.log
It saves the files it downloads using the following names:
- %Application Data%\Flash\firstsg.vbs
- %Application Data%\Flash\flashcl.exe
- %Application Data%\Flash\flashsec.exe
- %Application Data%\Flash\info.txt
- %Application Data%\Flash\sgminer.exe
- %Application Data%\Flash\startcl.vbs
- %Application Data%\Flash\startsec.vbs
- %Application Data%\Flash\updatecl.vbs
- %Application Data%\Flash\updatesec.vbs
- %Application Data%\Flash\updatesg.vbs
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)