Počet zobrazení stránky

středa 4. dubna 2012

Trojan-Dropper.Win32.Agent.akap


Technical Details

This Trojan installs other programs to the victim machine without the knowledge or consent of the user. It is a Windows application (PE EXE file). It is 21 580 bytes in size. It is packed using PE_Patch or UPack. The unpacked file is approximately 283 KB in size. It is written in C++.

Payload

Once launched, the Trojan creates a unique identifier to ensure that its process is unique in the system:
__NBA_MUTEX_0__
Also, the following directory is created in the root directory of the C drive:
C:\<rnd>
where <rnd> is an eight-digit hexadecimal number generated on the basis of the current system time.
The directory is created with the "hidden" and "system" attributes.
If the Trojan detects the driver called "ProtectedC.sys", it extracts the following files from its body:
%ALLUSERSPROFILE%\Start Menu\Programs\Startup\human.exe
(4096 bytes; detected by Kaspersky Anti-Virus as "Trojan-Downloader.Win32.Small.yaa")
\\.\Root#RCVYL#0000#KsecDD\%System%\mmc.exe
(4096 bytes; detected by Kaspersky Anti-Virus as "Trojan-Downloader.Win32.Small.yaa")
\\.\Root#RCVYL#0000#KsecDD\%System%\user32.dll
(4096 bytes; detected by Kaspersky Anti-Virus as "Trojan.Win32.Patched.dz")
\\.\Root#RCVYL#0000#KsecDD\%System%\winhlp32.exe
(4096 bytes; detected by Kaspersky Anti-Virus as "Trojan-Downloader.Win32.Small.xxg")
If the "hintFD.sys" driver is present in the system, the Trojan performs the following actions:
  • It extracts the library from its body and saves it as:
    C:\<rnd>\<rnd>.dll
    (4608 bytes; detected by Kaspersky Anti-Virus as "Trojan-Downloader.Win32.Small.yki")
  • It calls the "HookEnter" function from the extracted library.
  • It extracts the following files from its body:
    \\.\HintZ0\%System%\mmc.exe
    \\.\HintZ0\%System%\user32.dll
    \\.\HintZ0\%System%\winhlp32.exe
    \\.\HintZ3\%System%\mmc.exe
    \\.\HintZ3\%System%\user32.dll
    \\.\HintZ3\%System%\winhlp32.exe
    
    These files are the same as those described above.
  • It calls the "HookLeave" function from the extracted "<rnd>.dll" library and deletes this library. The Trojan also performs the following actions:
  • It terminates the "Beep" system service and substitutes its binary file:
    %System%\drivers\beep.sys
    with the file it extracted from its own body. The file is 13 696 bytes in size. It is detected by Kaspersky Anti-Virus as "Trojan-Downloader.Win32.Small.xxh". The Trojan then restarts this service.
  • It restores the original content of the file:
    %System%\drivers\beep.sys
  • It downloads a file from the Internet via the following link:
    http://www.m***8.cn/new.txt (At the time of writing this link was inactive)
    The file is saved in the system as:
    C:\<rnd>\<rnd>
    It contains links used to download other malicious files to the infected computer. From these links, the Trojan downloads files and saves them to the directory "C:\<rnd>" under random names.
    Once successfully downloaded, the files will be launched for execution.
The Trojan then ceases running.

Removal instructions

If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it:
  1. Delete the original Trojan file (its location will depend on how the program originally penetrated the infected computer).
  2. Delete the directory "C:\<rnd>" and all of its contents.
  3. Delete files created by the Trojan:
    %ALLUSERSPROFILE%\Start Menu\Programs\Startup\human.exe
    \\.\Root#RCVYL#0000#KsecDD\%System%\mmc.exe 
    \\.\Root#RCVYL#0000#KsecDD\%System%\user32.dll 
    \\.\Root#RCVYL#0000#KsecDD\%System%\winhlp32.exe 
    \\.\HintZ0\%System%\mmc.exe
    \\.\HintZ0\%System%\user32.dll
    \\.\HintZ0\%System%\winhlp32.exe
    \\.\HintZ3\%System%\mmc.exe
    \\.\HintZ3\%System%\user32.dll
    \\.\HintZ3\%System%\winhlp32.exe

Žádné komentáře:

Okomentovat