Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Dldr.CashDeluxe.C.2
Date discovered:03/04/2006
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:11.776 Bytes
MD5 checksum:6b33d276117ad80A17d64ed19749b262
VDF version:6.34.00.132

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Downloader.Win32.CashDeluxe.c
   •  Bitdefender: Trojan.Downloader.Cashdeluxe.C


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads malicious files
   • Drops a file
   • Registry modification

 Files The following file is created:

Non malicious file:
   • %SYSDIR%\shellgui32.dll




It tries to download some files:

The location is the following:
   • http://stats.cashdeluxe.net/sys/**********
It is saved on the local hard drive under: %SYSDIR%\exuc32.tmp Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: TR/Dialer.OW.13


The location is the following:
   • http://stats.cashdeluxe.net/sys/**********
It is saved on the local hard drive under: %SYSDIR%\winsrv32.exe Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: TR/Dldr.VB.ZI

 Registry It registers a browser helper object (BHO) by adding the following key:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
   Browser Helper Objects\{41DD58D5-6692-433F-AE6C-64E157A496C4}]
   • @=""



The following registry keys are added:

[HKCR\TypeLib\{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}\1.0]
   • @="winapi32"

[HKCR\TypeLib\{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}\1.0\0\win32]
   • @="%SYSDIR%\winapi32.dll"

[HKCR\TypeLib\{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}\1.0\FLAGS]
   • @="0"

[HKCR\TypeLib\{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}\1.0\HELPDIR]
   • @="c:\windows\\System32"

[HKCR\Interface\{0017A6E3-3DC7-4459-9C72-807B558198AB}]
   • @="MyBHO"

[HKCR\Interface\{0017A6E3-3DC7-4459-9C72-807B558198AB}\
   ProxyStubClsid]
   • @="{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{0017A6E3-3DC7-4459-9C72-807B558198AB}\
   ProxyStubClsid32]
   • @="{00020424-0000-0000-C000-000000000046}"

[HKCR\Interface\{0017A6E3-3DC7-4459-9C72-807B558198AB}\TypeLib]
   • @="{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}"
   • "Version"="1.0"

[HKCR\CLSID\{41DD58D5-6692-433F-AE6C-64E157A496C4}]
   • @="winapi32.MyBHO"

[HKCR\CLSID\{41DD58D5-6692-433F-AE6C-64E157A496C4}\InprocServer32]
   • @="%SYSDIR%\winapi32.dll"
   • "ThreadingModel"="Apartment"

[HKCR\CLSID\{41DD58D5-6692-433F-AE6C-64E157A496C4}\ProgID]
   • @="winapi32.MyBHO"

[HKCR\CLSID\{41DD58D5-6692-433F-AE6C-64E157A496C4}\TypeLib]
   • @="{3F8CEAEE-2798-4800-9F7B-D3FCAB739265}"

[HKCR\CLSID\{41DD58D5-6692-433F-AE6C-64E157A496C4}\VERSION]
   • @="1.0"

[HKCR\winapi32.MyBHO]
   • @="winapi32.MyBHO"

[HKCR\winapi32.MyBHO\Clsid]
   • @="{41DD58D5-6692-433F-AE6C-64E157A496C4}"

 File details Programming language:
The malware program was written in Visual Basic.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Iulia Diaconescu on Wednesday, March 29, 2006
Description updated by Iulia Diaconescu on Tuesday, April 4, 2006

Back . . . .