TROJ_APANTA.A
TR/Spy.Arpnatis.A(Antivir),Trojan.Win32.Generic!BT(Sunbelt),Trojan horse SHeur4.BQQB(AVG)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
152,260 bytes
EXE
No
30 Sep 2013
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following files:
- %System Root%\Documents and Settings\All Users\Application Data\Adobe\readme.txt
- %System Root%\Documents and Settings\winxp.KARLD-WINXP\Local Settings\Temp\tmp5530\readme.txt
(Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.)
It drops the following copies of itself into the affected system:
- %System Root%\All Users\Application Data\Adobe\airplugin.v6.40.0.cpl
- %System Root%\Documents and Settings\winxp.KARLD-WINXP\Local Settings\Temp\tmp5530\ins3826.exe
- %System Root%\Documents and Settings\winxp.KARLD-WINXP\Local Settings\Temp\tmp5530\mpro36.cpl
(Note: %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.)
Autostart Technique
This Trojan adds the following registry entries to enable its automatic execution at every system startup:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Run
airplugin.v6.40.0 = "rundll32 "%System Root%\Documents and Settings\All Users\Application Data\Adobe\airplugin.v6.40.0.cpl" ,start1 /exc"