Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Dldr.VB.XV
Date discovered:03/03/2006
Type:Trojan
Subtype:Downloader
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:45.056 Bytes
MD5 checksum:751a8c76f3a18dc730c7b45f5d17fd84
VDF version:6.33.01.54

 General Method of propagation:
   • No own spreading routine


Alias:
   •  Kaspersky: Trojan-Downloader.Win32.VB.xv


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads files
   • Downloads malicious files
   • Registry modification

 Files It tries to download some files:

– The location is the following:
   • http://content.dollarrevenue.com/**********
It is saved on the local hard drive under: c:\keyboard.exe Further investigation pointed out that this file is malware, too.

– The location is the following:
   • http://content.dollarrevenue.com/**********
It is saved on the local hard drive under: c:\gimmysmileys.exe Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too.

– The location is the following:
   • http://content.dollarrevenue.com/**********
It is saved on the local hard drive under: c:\mousepad.exe Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too.

– The location is the following:
   • www.nonameforthisdomain.com/**********
It is saved on the local hard drive under: c:\windows\teller2.chk

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
   • "keyboard" = "%malware execution directory%\%executed file%"



The values of the following registry key are removed:

–  [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
   • "winsysupd"
   • "timessquare"
   • "msresearch"
   • "easywww"
   • "enewsletterpro"



The following registry key is added:

– [HKCU\Software\Microsoft\Internet Explorer\Search\
   SearchAssistant Explorer\Main]
   • "Default_Search_URL"="http://searchbar.findthewebsiteyouneed.com"



The following registry keys are changed:

Internet Explorer's start page:
– [HKCU\Software\Microsoft\Internet Explorer\Main]
   Old value:
   • "Start Page"="%user defined settings%"
   • "Search Page"="%user defined settings%"
   • "Search Bar"="%user defined settings%"
   • "Default_Search_URL"="%user defined settings%"
   New value:
   • "Start Page"="http://www.findthewebsiteyouneed.com"
   • "Search Page"="http://searchbar.findthewebsiteyouneed.com"
   • "Search Bar"="http://searchbar.findthewebsiteyouneed.com"
   • "Default_Search_URL"="http://searchbar.findthewebsiteyouneed.com"

Internet Explorer's start page:
– [HKLM\Software\Microsoft\Internet Explorer\Main]
   Old value:
   • "Search Page"="%user defined settings%"
   New value:
   • "Search Page"="http://searchbar.findthewebsiteyouneed.com"

– [HKLM\Software\Microsoft\Internet Explorer\Search]
   Old value:
   • "SearchAssistant"="%user defined settings%"
   New value:
   • "SearchAssistant"="http://searchbar.findthewebsiteyouneed.com"

 Backdoor Contact server:
The following:
   • www.nonameforthisdomain.com/**********

As a result remote control capability is provided. The servers answer is written to the file: c:\windows\%executed file%1.dat


Remote control capabilities:
    • Download file
    • Edit registry

 File details Programming language:
The malware program was written in Visual Basic.

Description inserted by Daniel Constantin on Friday, March 3, 2006
Description updated by Daniel Constantin on Tuesday, March 7, 2006

Back . . . .