Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Agent.xqa
Date discovered:10/02/2009
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Medium to high
Static file:Yes
File size:525.824 Bytes
MD5 checksum:bc487bf4127975784707caca5ec7dc13
IVDF version:7.01.02.05 - Tuesday, February 10, 2009

 General Methods of propagation:
Autorun feature
   • Local network


Aliases:
   •  Mcafee: W32/Spybot.worm.gen virus
   •  Sophos: Mal/Generic-A
   •  Panda: W32/IRCBot.CKA.worm
   •  Eset: Win32/IRCBot.ANZ
   •  Bitdefender: Trojan.Generic.1763810


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification
   • Makes use of software vulnerability
   • Third party control

 Files It copies itself to the following locations:
   • %SYSDIR%\wmiprvse.exe
   • %drive%\RECYCLER\%SID%\openfiles.exe



It deletes the initially executed copy of itself.



The following file is created:

%drive%\RECYCLER\%SID%\Destop.ini
%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%SYSDIR%\drivers\sysdrv32.sys Further investigation pointed out that this file is malware, too. Detected as: TR/Hacktool.Tcpz.A

 Registry The following registry key is added in order to run the process after reboot:

[HKLM\SYSTEM\CurrentControlSet\Services\WMIMGIN]
   • "Description"="Provides control and info about management."
   • "DisplayName"="WMI Management App"
   • "ErrorControl"=dword:0x00000000
   • "FailureActions"=hex:0A,00,00,00,00,00,00,00,00,00,00,00,01,00,00,00,00,00,00,00,01,00,00,00,B8,0B,00,00
   • "ImagePath"=""%SYSDIR%\wmiprvse.exe""
   • "ObjectName"="LocalSystem"
   • "Start"=dword:0x00000002
   • "Type"=dword:0x00000110



The following registry keys are added in order to load the service after reboot:

[HKLM\SYSTEM\CurrentControlSet\Services\sysdrv32]
   • "DisplayName"="Play Port I/O Driver"
   • "ErrorControl"=dword:0x00000001
   • "Group"="SST miniport drivers"
   • "ImagePath"="\??\%SYSDIR%\drivers\sysdrv32.sys"
   • "Start"=dword:0x00000003
   • "Type"=dword:0x00000001



The following registry key is changed:

[HKLM\SYSTEM\CurrentControlSet\Control]
   New value:
   • "WaitToKillServiceTimeout"="7000"

 Network Infection – MS04-007 (ASN.1 Vulnerability)
MS06-040 (Vulnerability in Server Service)


IP address generation:
It creates random IP addresses while it keeps the first octet from its own address. Afterwards it tries to establish a connection with the created addresses.


Remote execution:
It attempts to schedule a remote execution of the malware, on the newly infected machine. Therefore it uses the NetScheduleJobAdd function.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: sec.re**********.info
Port: 8085
Server password: 3v1l$
Channel: #sploit
Nickname: [00|USA|XP|%number%]
Password: sPLoiT!


 Furthermore it has the ability to perform actions such as:
    • Disable network shares
    • Enable network shares
     Perform network scan

 Backdoor The following port is opened:

%SYSDIR%\wmiprvse.exe on a random TCP port in order to provide an HTTP server.

 Rootkit Technology Hides the following:
– Its own process

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Monday, November 30, 2009
Description updated by Petre Galan on Monday, November 30, 2009

Back . . . .