PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel: Downloaded from the Internet

This malware family of Trojans is used to download other malware on the affected systems thus further compromising its security.

  TECHNICAL DETAILS

Memory Resident: Yes

Installation

This Trojan drops the following copies of itself into the affected system:

  • %Application Data%\dgdu.exe
  • %Application Data%\ewuj.exe
  • %Application Data%\mbql.exe
  • %Application Data%\mwvt.exe
  • %Application Data%\oyse.exe
  • %Application Data%\qlcm.exe
  • %Application Data%\rint.exe
  • %Application Data%\roxy.exe
  • %Application Data%\tdkw.exe
  • %Application Data%\vlbl.exe
  • %Application Data%\vlcs.exe
  • %Application Data%\xvsw.exe

(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)

Autostart Technique

This Trojan adds the following registry entries to enable its automatic execution at every system startup:

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc7c9ccc891dac7da = "%Application Data%\xvsw.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc9d3dccc91dac7da = "%Application Data%\vlcs.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbc9d3ddd391dac7da = "%Application Data%\vlbl.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcbdbd4c891dac7da = "%Application Data%\tdkw.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcdd0c7c691dac7da = "%Application Data%\roxy.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbcdd6d1cb91dac7da = "%Application Data%\rint.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbced3dcd291dac7da = "%Application Data%\qlcm.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd0c6ccda91dac7da = "%Application Data%\oyse.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd2c8c9cb91dac7da = "%Application Data%\mwvt.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbd2ddced391dac7da = "%Application Data%\mbql.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbdac8cad591dac7da = "%Application Data%\ewuj.exe"

HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
d2d0dbdbd8dbca91dac7da = "%Application Data%\dgdu.exe"

Other System Modifications

This Trojan adds the following registry entries as part of its installation routine:

HKEY_CURRENT_USER\Software\bfb396eaa9cf
prj = "6"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
ver = "1.0.0.114"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
DC = "4"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc7c9ccc891dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc9d3dccc91dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbc9d3ddd391dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcbdbd4c891dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcdd0c7c691dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbcdd6d1cb91dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbced3dcd291dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd0c6ccda91dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd2c8c9cb91dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbd2ddced391dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbdac8cad591dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
Location = "d2d0dbdbd8dbca91dac7da"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
idt = "{date and time}"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "cln1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "co1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "jmid2"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "kkr1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "lmcl4"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "tcz1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "up1"

HKEY_CURRENT_USER\Software\bfb396eaa9cf
pid = "wst1"

It adds the following registry keys as part of its installation routine:

HKEY_CURRENT_USER\Software\bfb396eaa9cf

Other Details

This Trojan connects to the following possibly malicious URL:

  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=1&pid=up1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=cln1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=co1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=2&pid=tcz1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=jmid1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=jmid2&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=4&pid=lmcl4&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=5&pid=wst1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/app.asp?prj=6&pid=kkr1&logdata=MacTryCnt:0&code=&ver=1.0.0.114&appcheck=1
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=1&pid=up1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=cln1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=co1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=2&pid=tcz1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=jmid1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=jmid2&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=4&pid=lmcl4&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=5&pid=wst1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/setup_b.asp?prj=6&pid=kkr1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/receive/r_autoidcnt.asp?mer_seq=1&realid=up1&cnt_type=e1&mac=000c29551670
  • http://{BLOCKED}x.{BLOCKED}ys{number}.com/receive/r_autoidcnt.asp?mer_seq=1&realid=up1&cnt_type=e2&mac=000c29551670&logdata=MacTryCnt:0