Analysis by: Roland Marco Dela Paz

 PLATFORM:

Windows 2000, XP, Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

This Trojan may be dropped by other malware.

It requires its main component to successfully perform its intended routine.

  TECHNICAL DETAILS

File Size: Varies
File Type: DLL
Memory Resident: No
Initial Samples Received Date: 07 Oct 2010
Payload: Downloads files, Terminates processes

Arrival Details

This Trojan may be dropped by the following malware:

  • BKDR_QBOT family

Installation

This Trojan adds the following mutexes to ensure that only one of its copies runs at any one time:

  • ~e198ac781b.tmp
  • ~e439125sl.tmp

Other System Modifications

This Trojan adds the following registry entries:

HKLM\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
{default} =

HKLM\SOFTWARE\Microsoft\
Windows\CurrentVersion\Runonce
{default} =

Other Details

This Trojan requires its main component to successfully perform its intended routine.

It does the following:

  • It exports backdoor functionalities used by its main component.
  • It exports the following functions:
    notify C&C server on the malware's installation status and bot information (version, install date and time)
    search for specific directories
    download updated copy of the malware
    download other components
    download and execute other possibly malicious files
    create scheduled tasks
    get system information
    get IP address
    uninstall itself
    create/terminate processes
    collect internet certificates
    perform FTP and IRC commands
  • It terminates processes with any of the following strings in it:
    msdev.exe
    dbgview.exe
    mirc.exe
    ollydbg.exe
    ccApp.exe
    skype
    R&Q.exe
    photoed
    outlook.exe
    mmc.exe
    ctfmon.exe
  • It prevents users from visiting sites w/ any of the following strings in address bar:
    webroot
    agnitum
    ahnlab
    arcabit
    avast
    avg
    avira
    avp
    bitdefender
    bit9
    castlecops
    centralcommand
    clamav
    comodo
    computerassociates
    cpsecure
    defender
    drweb
    emsisoft
    esafe
    eset
    etrust
    ewido
    fortinet
    f-prot
    f-secure
    gdata
    grisoft
    hacksoft
    hauri
    ikarus
    jotti
    k7computing
    kaspersky
    malware
    mcafee
    microsoft
    networkassociates
    nod32
    norman
    norton
    panda
    pctools
    prevx
    quickheal
    rising
    rootkit
    securecomputing
    sophos
    spamhaus
    spyware
    sunbelt
    symantec
    threatexpert
    trendmicro
    virus
    wilderssecurity
    windowsupdate
  • It opens and execute commands in following processes:
    cmd.exe
    far.exe
    nc.exe
  • It steals information whenever an infected user visits a website with any of the following strings in its address:
    cashproonline.bankofamerica.com
    /cashplus/
    ebanking-services.com
    /cashman/
    web-cashplus.com
    treas-mgt.frostbank.com
    business-eb.ibanking-services.com
    treasury.pncbank.com
    access.jpmorgan.com
    ktt.key.com
    onlineserv/CM
    premierview.membersunited.org
    directline4biz.com
    onb.webcashmgmt.com
    tmconnectweb
    moneymanagergps.com
    ibc.klikbca.com
    directpay.wellsfargo.com
    express.53.com
    itreasury.regions.com
    itreasurypr.regions.com
    cpw-achweb.bankofamerica.com
    businessaccess.citibank.citigroup.com
    businessonline.huntington.com
  • It connects to the following sites to send and receive information, download updates, and download other possibly malicious files:
    http://{BLOCKED}wthewhistle.com/cgi-bin/clientinfo3.pl
    http://www.{BLOCKED}cdc2121cdsfdfd.com
    http://{BLOCKED}wthewhistle.com/cgi-bin/clientinfo3.pl
    http://{BLOCKED}rver.com.ua/cgi-bin/exhandler4.pl
    http://{BLOCKED}2.cn/cgi-bin/jl/jloader.pl?r=3d
    http://{BLOCKED}ver.com.ua/cgi-bin/ss.pl
    {BLOCKED}ver.com.ua:31666
    {BLOCKED}v.co.in
    {BLOCKED}04.cn
    {BLOCKED}01.co.in
    {BLOCKED}2.co.in
    {BLOCKED}3.in
    {BLOCKED}03.com.ua
  • It steals sensitive information such as username and and passwords from the following:
    Windows Address Book
    Protected Storage
    Internet Account Manager
    Active Directory - Bigfoot, VeriSign, and WhoWhere
  • It may also connect to the following sites:
    search.msn.com
    .hotbar.com

  SOLUTION

Minimum Scan Engine: 8.900
VSAPI OPR PATTERN File: 07.520.01
VSAPI OPR PATTERN Date: 07 Oct 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Scan your computer with your Trend Micro product and note files detected as TROJ_QBOT.TX

Step 3

Restart in Safe Mode

[ Learn More ]

Step 4

Delete this registry key

[ Learn More ]

Important: Editing the Windows Registry incorrectly can lead to irreversible system malfunction. Please do this step only if you know how or you can ask assistance from your system administrator. Else, check this Microsoft article first before modifying your computer's registry. Before you could do this, you must restart in Safe Mode. For instructions on how to do this, you may refer to this page If the preceding step requires you to restart in safe mode, you may proceed to edit the system registry.

  • In HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
    • Run
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
    • Runonce

Step 5

Search and delete the file detected as TROJ_QBOT.TX

[ Learn More ]
Please make sure you check the Search Hidden Files and Folders checkbox in the More advanced options option to include all hidden files in the search result.

Step 6

Restart in normal mode and scan your computer with your Trend Micro product for files detected as TROJ_QBOT.TX. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.