Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/PSW.Onlineg.ALZR
Descoperit pe data de:05/03/2009
Tip:Troian
ITW:Da
Numar infectii raportate:Mediu
Potential de raspandire:Mediu
Potential de distrugere:Mediu
Fisier static:Da
Marime:168.420 Bytes
MD5:42438a0F0D9501bf1370287ff4b451bd
Versiune IVDF:7.01.02.122 - joi, 5 martie 2009

 General Alias:
   •  Symantec: Infostealer.Gampass
   •  Mcafee: Generic PWS.ak trojan !!!
   •  Kaspersky: Trojan.Win32.Agent2.eij
   •  Sophos: Mal/EncPk-HI
   •  Panda: W32/Lineage.KYR
   •  Eset: Win32/PSW.OnLineGames.NMY
   •  Bitdefender: Trojan.PWS.OnLineGames.KCND


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003


Efecte secundare:
   • Descarca fisiere malware
   • Creeaza fisiere malware
   • Reduce setarile de securitate
   • Modificari in registri

 Fisiere Se copiaza in urmatoarele locatii:
   • %unitate disc%\d8k6hg.com
   • %SYSDIR%\kva8wr.exe



Suprascrie un fisier.
– %SYSDIR%\drivers\cdaudio.sys



Sterge copia initiala a virusului.



Sterge urmatorul fisier:
   • %SYSDIR%\drivers\cdaudio.sys



Sunt create fisierele:

– %unitate disc%\autorun.inf Acesta este un fisier text care nu prezinta pericol si are urmatorul continut:
   • %cod care ruleaza fisierul malitios%

– %unitate disc%\gjnfah.cmd (176444) Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/Crypt.ZPACK.Gen

– %SYSDIR%\ahnsbsb.exe (176444) Detectat ca: TR/Crypt.ZPACK.Gen

– %SYSDIR%\bgotrtu0.dll (73728) Detectat ca: TR/PSW.OnLin.ALZR.1

– %SYSDIR%\ahnfgss0.dll (88576) Detectat ca: TR/Crypt.ZPACK.Gen

– %SYSDIR%\uweyiwe0.dll (97280) Detectat ca: TR/Crypt.XPACK.Gen

– %SYSDIR%\ahnxsds0.dll (81920) Detectat ca: TR/Crypt.ZPACK.Gen




Incearca sa descarce cateva fisiere:

– Adresa este urmatoarea:
   • http://yklop.com/xhg2/**********
Analiza ulterioara a relevat ca si acest fisier este malware.

– Adresa este urmatoarea:
   • http://kioytrfd.com/xhg2/**********

 Registrii sistemului Urmatoarea cheie este adaugata in registri pentru a rula procesul la repornirea sistemului:

– [HKLM\SYSTEM\CurrentControlSet\Services\AVPsys]
   • "Start"=dword:0x3
   • "Type"=dword:0x1
   • "ImagePath"="\??\%SYSDIR%\drivers\cdaudio.sys"
   • "DisplayName"="AVPsys"
   • "ErrorControl"=dword:0x1



Una din urmatoarele valori este adaugata in registri pentru pornirea automata a procesului dupa reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "ahnsoft"="%SYSDIR%\ahnsbsb.exe"
   • "kvasoft"="%SYSDIR%\kva8wr.exe"



Inregistreaza un browser helper object (BHO) prin adaugarea urmatoarelor chei in registri:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
   Browser Helper Objects\{238C32AB-955D-4707-AAB9-C9B3AB8D4225}]
– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
   Browser Helper Objects\{F171A450-7AF5-43E1-AFED-EDC826A1B0F5}]


Urmatoarele chei sunt adaugate in registrii sistemului:

– [HKLM\SOFTWARE\Classes\CLSID\MNDOWN]
   • "urlinfo"="m1chgt.e"

– [HKLM\SOFTWARE\Classes\CLSID\
   {238C32AB-955D-4707-AAB9-C9B3AB8D4225}]
   • "(default)"="IEHlprObj Class"

– [HKLM\SOFTWARE\Classes\CLSID\{238C32AB-955D-4707-AAB9-C9B3AB8D4225}\
   InprocServer32]
   • "ThreadingModel"="Apartment"
   • "(default)"="%SYSDIR%\ahnxsds0.dll"

– [HKLM\SOFTWARE\Classes\CLSID\{238C32AB-955D-4707-AAB9-C9B3AB8D4225}\
   ProgID]
   • "(default)"="IEHlprObj.IEHlprObj.1"

– [HKLM\SOFTWARE\Classes\Interface\
   {238C32AC-955D-4707-AAB9-C9B3AB8D4225}]
   • @="IIEHlprObj"

– [HKLM\SOFTWARE\Classes\Interface\
   {238C32AC-955D-4707-AAB9-C9B3AB8D4225}\ProxyStubClsid]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {238C32AC-955D-4707-AAB9-C9B3AB8D4225}\ProxyStubClsid32]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {238C32AC-955D-4707-AAB9-C9B3AB8D4225}\TypeLib]
   • "Version"="1.0"
   • @="{238C32A2-955D-4707-AAB9-C9B3AB8D4225}"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}]
   • @="IIEHlprObj"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}\ProxyStubClsid]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}\ProxyStubClsid32]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {238C32AC-955D-4707-AAB9-C9B3AB8D4225}\TypeLib]
   • Version"="1.0"
   • @="{238C32A2-955D-4707-AAB9-C9B3AB8D4225}"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}]
   • @="IIEHlprObj"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}\ProxyStubClsid]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}\ProxyStubClsid32]
   • @="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {F171A44F-7AF5-43E1-AFED-EDC826A1B0F5}\TypeLib]
   • "Version"="1.0"
   • @="{F171A442-7AF5-43E1-AFED-EDC826A1B0F5}"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {238C32A2-955D-4707-AAB9-C9B3AB8D4225}\1.0]
   • @="IEHelper 1.0 Type Library"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {238C32A2-955D-4707-AAB9-C9B3AB8D4225}\1.0\0\win32]
   • @="%SYSDIR%\ahnxsds0.dll"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {238C32A2-955D-4707-AAB9-C9B3AB8D4225}\1.0\FLAGS]
   • @="0"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {238C32A2-955D-4707-AAB9-C9B3AB8D4225}\1.0\HELPDIR]
   • @="%SYSDIR%\"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {F171A442-7AF5-43E1-AFED-EDC826A1B0F5}\1.0]
   • @="IEHelper 1.0 Type Library"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {F171A442-7AF5-43E1-AFED-EDC826A1B0F5}\1.0\0\win32]
   • @="%SYSDIR%\bgotrtu0.dll"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {F171A442-7AF5-43E1-AFED-EDC826A1B0F5}\1.0\FLAGS]
   • @="0"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {F171A442-7AF5-43E1-AFED-EDC826A1B0F5}\1.0\HELPDIR]
   • @="%SYSDIR%\"



Urmatoarele chei din registri sunt modificate:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
   Folder\Hidden\SHOWALL]
   Noua valoare:
   • "CheckedValue"=dword:0x0

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
   Noua valoare:
   • "Hidden"=dword:0x2
   • "ShowSuperHidden"=dword:0x0

 Injectarea codului malware in alte procese –  Injecteaza fisierul urmator intr-un proces: %SYSDIR%\ahnfgss0.dll

    Numele procesului:
   • %toate procesele active%


 Detaliile fisierului Compresia fisierului:
Pentru a ingreuna detectia si a reduce marimea fisierului, este folosit un program de compresie runtime.

Description inserted by Petre Galan on Monday, October 19, 2009
Description updated by Petre Galan on Monday, October 19, 2009

Back . . . .