Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Dldr.iBill.BR
Date discovered:24/11/2008
Type:Trojan
Subtype:Downloader
In the wild:Yes
Reported Infections:Medium
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:26.112 Bytes
MD5 checksum:b2f27d1b598d46998eda3a12ddfe140e
IVDF version:7.01.00.130 - Monday, November 24, 2008

 General Method of propagation:
   • Email


Aliases:
   •  Symantec: Downloader
   •  Mcafee: Spy-Agent.bw
   •  Kaspersky: Worm.Win32.AutoRun.svl
   •  TrendMicro: WORM_AUTORUN.BWQ
   •  F-Secure: Worm.Win32.AutoRun.svl
   •  Sophos: Troj/Agent-IIJ
   •  Grisoft: Pakes.ANT
   •  VirusBuster: Trojan.Agent.FKIA
   •  Eset: Win32/AutoRun.FakeAlert.AD
   •  Bitdefender: Trojan.Agent.ALHD


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a malicious file
   • Registry modification

 Files It copies itself to the following location:
   • %PROGRAM FILES%\Microsoft Common\svchost.exe



It deletes the initially executed copy of itself.




It tries to download a file:

The location is the following:
   • http://univnext.cn/**********.php?v=1&rs=**********&n=1&uid=1
This file may contain further download locations and might serve as source for new threats.

 Registry The following registry key is added:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\explorer.exe]
   • Debugger = "%PROGRAM FILES%\Microsoft Common\svchost.exe"

 Email It doesn't have its own spreading routine but it was spammed out via email. The characteristics are described in the following:


From:
The sender address is spoofed.


Subject:
The following:
   • Abrechnung %several random numbers from 0 to 9%



Body:
The body of the email is the following:

   • Sehr geehrte Damen und Herren!
     Die Anzahlung Nr.%several random numbers from 0 to 9% ist erfolgt
     Es wurden 2455.00 EURO Ihrem Konto zu Last geschrieben.
     Die Auflistung der Kosten finden Sie im Anhang in der Datei: Abrechnung.
     
     Regel Inkasso GmbH & Co. KG
     Fredeburger Str. 21
     33699 Bielefeld
     
     Postfach 51 20 05
     33698 Bielefeld
     
     Tel.: 0521 93212-0
     Fa x: 0521 92412-15
     
     AG Bielefeld HRA 13169
     Steuer-Nummer: 349/5749/0377
     
     Komplementargesellschaft:
     Regel Verwaltungs-GmbH
     AG Bielefeld HRA 34932


Attachment:
The filename of the attachment is:
   • abrechnung.zip

The attachment is an archive containing a copy of the malware itself.

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Thomas Wegele on Tuesday, November 25, 2008
Description updated by Thomas Wegele on Tuesday, November 25, 2008

Back . . . .