TROJ_NEBULER
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This malware family can be downloaded via visiting malicious websites. Its main function is to download other malware onto infected systems thus compromising its security.
TECHNICAL DETAILS
Yes
Downloads files
Installation
This Trojan drops the following files:
- %System%\msi{random three letters}32.dll
(Note: %System% is the Windows system folder, which is usually C:\Windows\System32.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
MSIDLL = "rundll32.exe %System%\msi{random three letters}32.dll,{random}"
Other System Modifications
This Trojan adds the following registry keys as part of its installation routine:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
{random}
It creates the following registry entry(ies) to bypass Windows Firewall:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\
List
{malware path}\{malware name} = "{malware path}\{malware name}:*:Enabled:1"
Other Details
This Trojan connects to the following possibly malicious URL:
- http://{BLOCKED}c.unas.cz/admin/index.php?q={random}
- http://{BLOCKED}ob.nl/admin/index.php?q={random}
- http://{BLOCKED}nsle1.la.funpic.de/admin/index.php?q={random}
- http://{BLOCKED}e.com/upd.php?q={random}
- http://{BLOCKED}d.com/upd.php?q={random}
- http://www.{BLOCKED}a.wz.cz/admin/index.php?q={random}
- http://www.{BLOCKED}astranka.wz.cz/admin/index.php?q={random}
- http://www.{BLOCKED}iesan.wz.cz/admin/index.php?q={random}
- http://www.{BLOCKED}e-nemecko.wz.cz/admin/index.php?q={random}
- http://www.{BLOCKED}e-nemecko2006.wz.cz/admin/index.php?q={random}
- http://www.{BLOCKED}007.unas.cz/admin/index.php?q={random}
- http://www.{BLOCKED}epower.wz.cz/adv/index.php?q={random}
- http://www.{BLOCKED}ug.xf.cz/admin/index.php?q={random}
- http://www.{BLOCKED}y.mysteria.cz/admin/index.php?q={random}
- http://www.{BLOCKED}nt1bnt.w8w.pl/admin/index.php?q={random}
- http://www.{BLOCKED}erin.com/admin/index.php?q={random}