Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:DR/Agent.MT
Date discovered:13/12/2012
Type:Dropper
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:179.712 Bytes
MD5 checksum:af9b414ca4e341e76d07e999aa1e0faa
VDF version:7.11.53.216

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: Downloader-PE
   •  Kaspersky: Trojan-Dropper.Win32.Agent.mm
   •  TrendMicro: TROJ_AGENT.SZ
   •  VirusBuster: Trojan.DR.Agent.RV
   •  Bitdefender: Trojan.Dropper.Agent.MM


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops a malicious file
   • Lowers security settings
   • Registry modification

 Files The following file is created:

%TEMPDIR%\installer.exe Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Dldr.Dyfuca.DB.1

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Installer"="%malware execution directory%\%executed file%"



The following registry keys are changed:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\3]
   Old value:
   • "CurrentLevel"=%user defined settings%
   • "Flags"=%user defined settings%
   • "1001"=%user defined settings%
   • "1004"=%user defined settings%
   • "1200"=%user defined settings%
   • "1201"=%user defined settings%
   • "1400"=%user defined settings%
   • "1402"=%user defined settings%
   • "1405"=%user defined settings%
   • "1406"=%user defined settings%
   • "1407"=%user defined settings%
   • "1601"=%user defined settings%
   • "1604"=%user defined settings%
   • "1605"=%user defined settings%
   • "1606"=%user defined settings%
   • "1607"=%user defined settings%
   • "1608"=%user defined settings%
   • "1609"=%user defined settings%
   • "1800"=%user defined settings%
   • "1802"=%user defined settings%
   • "1803"=%user defined settings%
   • "1804"=%user defined settings%
   • "1805"=%user defined settings%
   • "1A00"=%user defined settings%
   • "1A02"=%user defined settings%
   • "1A03"=%user defined settings%
   • "1A04"=%user defined settings%
   • "1A05"=%user defined settings%
   • "1A06"=%user defined settings%
   • "1A10"=%user defined settings%
   • "1C00"=%user defined settings%
   • "1E05"=%user defined settings%
   • "1206"=%user defined settings%
   • "2001"=%user defined settings%
   • "2004"=%user defined settings%
   New value:
   • "CurrentLevel"=dword:00000001
   • "Flags"=dword:00000001
   • "1001"=dword:00000000
   • "1004"=dword:00000000
   • "1200"=dword:00000000
   • "1201"=dword:00000000
   • "1400"=dword:00000000
   • "1402"=dword:00000000
   • "1405"=dword:00000000
   • "1406"=dword:00000000
   • "1407"=dword:00000000
   • "1601"=dword:00000000
   • "1604"=dword:00000000
   • "1605"=dword:00000000
   • "1606"=dword:00000000
   • "1607"=dword:00000000
   • "1608"=dword:00000000
   • "1609"=dword:00000000
   • "1800"=dword:00000000
   • "1802"=dword:00000000
   • "1803"=dword:00000000
   • "1804"=dword:00000000
   • "1805"=dword:00000001
   • "1A00"=dword:00000000
   • "1A02"=dword:00000000
   • "1A03"=dword:00000000
   • "1A04"=dword:00000000
   • "1A05"=dword:00000000
   • "1A06"=dword:00000000
   • "1A10"=dword:00000001
   • "1C00"=dword:00010000
   • "1E05"=dword:00020000
   • "1206"=dword:00000000
   • "2001"=dword:00000000
   • "2004"=dword:00000000

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • ASProtect 2.0

Description inserted by Razvan Olteanu on Thursday, September 8, 2005
Description updated by Razvan Olteanu on Wednesday, September 21, 2005

Back . . . .