Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Xorer.174009
Date discovered:17/03/2008
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:94.208 Bytes
MD5 checksum:bfe68898bb94d7068582c642bfe0bc5c
VDF version:7.00.03.40

 General Method of propagation:
   • Mapped network drives


Aliases:
   •  Symantec: W32.Pagipef.I!inf
   •  Mcafee: W32/Xorer
   •  Kaspersky: Virus.Win32.Xorer.ew
   •  TrendMicro: PE_PAGIPEF.CA-O
   •  F-Secure: Virus.Win32.Xorer.ew
   •  Sophos: Mal/Xorer-A
   •  Panda: W32/Pagepif.G.worm
   •  VirusBuster: Win32.Xorer.O
   •  Eset: Win32/Xorer
   •  Bitdefender: Trojan.Xorer.T


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Disable security applications
   • Downloads files
   • Drops malicious files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\com\lsass.exe
   • %SYSDIR%\%random character string from 0 to 9%.log
   • %drive%\pagefile.pif



The following files are created:

%drive%\AUTORUN.INF This is a non malicious text file with the following content:
   • %code that runs malware%

%SYSDIR%\com\smss.exe Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Xorer.DR.40960

%SYSDIR%\com\netcfg.000 Detected as: TR/Xorer.A.1

%SYSDIR%\com\netcfg.dll Detected as: TR/Xorer.A.1

%drive%\NetApi000.sys Detected as: RKIT/Xorer.A.10

%SYSDIR%\dnsq.dll Detected as: TR/Spy.Gen




It tries to download a file:

– The location is the following:
   • http://w.c0m**********
This file may contain further download locations and might serve as source for new threats.

 Registry  The following registry keys including all values and subkeys are removed:
   • [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • [-HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}]
   • [-HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}]
   • [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options]



The following registry keys are changed:

Various Explorer settings:
– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
   Folder\SuperHidden]
   New value:
   • Type="radio"

Time format:
Various Explorer settings:
– [HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
   New value:
   • ShowSuperHidden = dword:00000000

 Process termination Processes with one of the following strings are terminated:
   • antivir; thunderrt6main; mcafee; facelesswndproc; bitdefender; ewido;
      monitor; mcagent; escan; firewall; dr.web; metapad; ieframe; diskgen;
      dummycom; xorer


 Injection –  It injects the following file into a process: %SYSDIR%\dnsq.dll

    Process name:
   • %all running processes%


 Miscellaneous  Checks for an internet connection by contacting the following web site:
   • www.baidu.com

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Alexandru Dinu on Thursday, July 31, 2008
Description updated by Andrei Ivanes on Tuesday, September 16, 2008

Back . . . .