TROJ_MIDHOS.BY
Trojan.Win32.Midhos.cymo (Kaspersky), a variant of Win32/Medfos.XO trojan (NOD32)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan may arrive bundled with malware packages as a malware component.
It requires its main component to successfully perform its intended routine.
TECHNICAL DETAILS
Arrival Details
This Trojan may arrive bundled with malware packages as a malware component.
Installation
This Trojan drops the following file(s)/component(s):
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}\chrome\content\browser.xul
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}\chrome.manifest
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}\install.rdf
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
It creates the following folders:
- %Application Data%\Microsoft\Protect\S-1-5-21-1614895754-436374069-682003330-1003\b1d5470d-6899-4f20-a4cd-ae0086f4a858
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions.sqlite
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}\chrome
- %Application Data%\Mozilla\Firefox\Profiles\4wwmjcqo.default\extensions\{624fdd7d-2457-11e3-8277-b8ac6f996f26}\chrome\content
(Note: %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
{Malware File Name} = "rundll32.exe {Malware Path and File Name}.dll"
Other System Modifications
This Trojan adds the following registry entries as part of its installation routine:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion
{Malware File Name} = "{random letters}"
Other Details
This Trojan requires its main component to successfully perform its intended routine.