Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/PSW.Magania.dfoc
Descoperit pe data de:30/05/2010
Tip:Troian
ITW:Da
Numar infectii raportate:Scazut spre mediu
Potential de raspandire:Scazut spre mediu
Potential de distrugere:Scazut spre mediu
Fisier static:Da
Marime:185.856 Bytes
MD5:4f9c69751b9d77229b5ddb2d1ea129b2
Versiune VDF:7.10.03.80
Versiune IVDF:7.10.07.196 - duminică, 30 mai 2010

 General Metoda de raspandire:
   • Functia autorun


Alias:
   •  Bitdefender: Trojan.PWS.OnlineGames.KDKY
   •  Panda: W32/Lineage.LLV
   •  Eset: Win32/PSW.OnLineGames.OUM


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003


Efecte secundare:
   • Reduce setarile de securitate
   • Descarca fisiere malware
   • Creeaza fisiere malware
   • Modificari in registri

 Fisiere Se copiaza in urmatoarele locatii:
   • %unitate disc%\313omdph.exe
   • %SYSDIR%\cyban.exe



Sterge copia initiala a virusului.



Sterge urmatoarele fisiere:
   • %SYSDIR%\cyban0.dll
   • %TEMPDIR%\ah1.rar
   • %TEMPDIR%\ah.exe



Sunt create fisierele:

%unitate disc%\autorun.inf Acesta este un fisier text care nu prezinta pericol si are urmatorul continut:
   • %cod care ruleaza fisierul malitios%

%TEMPDIR%\ah1.rar
%TEMPDIR%\ah.exe
%SYSDIR%\cyban0.dll Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/PSW.Magania.dfob

%SYSDIR%\ieban0.dll Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/PSW.Magania.dfal

%SYSDIR%\ahnabc0.dll Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/Crypt.ASPM.Gen

%SYSDIR%\ahnabc.exe Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/Crypt.ASPM.Gen

%temporary internet files%\ah1[1].rar
%temporary internet files%\ah[1].rar
%SYSDIR%\ahnie0.dll Analiza ulterioara a relevat ca si acest fisier este malware. Detectat ca: TR/Crypt.ASPM.Gen




Incearca sa descarce cateva fisiere:

– Adresa este urmatoarea:
   • http://www.googlevmk.com/1hg/**********


– Adresa este urmatoarea:
   • http://www.baiduwda.com/1hg/**********




Incearca sa execute urmatoarele fisiere:

– Numele fisierului:
   • %SYSDIR%\regsvr32.exe /s %SYSDIR%\ieban0.dll


– Numele fisierului:
   • "%PROGRAM FILES%\Internet Explorer\IEXPLORE.EXE"


– Numele fisierului:
   • "%TEMPDIR%\ah.exe"


– Numele fisierului:
   • %SYSDIR%\regsvr32.exe /s %SYSDIR%\ahnie0.dll

 Registrii sistemului Urmatoarea cheie este adaugata in registri pentru a rula procesul la repornirea sistemului:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "ahncsos"="%SYSDIR%\ahnabc.exe"
   • "cybansos"="%SYSDIR%\cyban.exe"



Urmatoarele chei sunt adaugate in registrii sistemului:

– [HKLM\SOFTWARE\Classes\CLSID\{70F6E582-8FF4-4082-829E-C172131DE31A}\
   VersionIndependentProgID]
   • "@"="IEHlprObj.IEHlprObj"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {70F6E522-8FF4-4082-829E-C172131DE31A}\1.0]
   • "@"="IEHelper 1.0 Type Library"

– [HKLM\SOFTWARE\Classes\Interface\
   {5DA743EB-6725-4ADE-BF17-C328743011FD}\ProxyStubClsid]
   • "@"="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {5DA7432B-6725-4ADE-BF17-C328743011FD}\1.0\0\win32]
   • "@"="%SYSDIR%\ahnie0.dll"

– [HKLM\SOFTWARE\Classes\Interface\
   {5DA743EB-6725-4ADE-BF17-C328743011FD}]
   • "@"="IIEHlprObj"

– [HKLM\SOFTWARE\Classes\Interface\
   {70F6E583-8FF4-4082-829E-C172131DE31A}\TypeLib]
   • "@"="{70F6E522-8FF4-4082-829E-C172131DE31A}"
   • "Version"="1.0"

– [HKLM\SOFTWARE\Classes\Interface\
   {70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid32]
   • "@"="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\HELPDIR]
   • "@"="%SYSDIR%\"

– [HKLM\SOFTWARE\Classes\CLSID\{70F6E582-8FF4-4082-829E-C172131DE31A}\
   ProgID]
   • "@"="IEHlprObj.IEHlprObj.1"

– [HKLM\SOFTWARE\Classes\Interface\
   {70F6E583-8FF4-4082-829E-C172131DE31A}]
   • "@"="IIEHlprObj"

– [HKLM\SOFTWARE\Classes\CLSID\
   {5DA743EA-6725-4ADE-BF17-C328743011FD}]
   • "@"="IEHlprObj Class"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {5DA7432B-6725-4ADE-BF17-C328743011FD}\1.0\FLAGS]
   • "@"="0"

– [HKLM\SOFTWARE\Classes\Interface\
   {5DA743EB-6725-4ADE-BF17-C328743011FD}\ProxyStubClsid32]
   • "@"="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj\CurVer]
   • "@"="IEHlprObj.IEHlprObj.1"

– [HKLM\SOFTWARE\Classes\CLSID\{70F6E582-8FF4-4082-829E-C172131DE31A}\
   InprocServer32]
   • "@"="%SYSDIR%\ieban0.dll"
   • "ThreadingModel"="Apartment"

– [HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj]
   • "@"="IEHlprObj Class"

– [HKLM\SOFTWARE\Classes\CLSID\MNDOWN]
   • "urlinfo"="chhjmf.t"

– [HKLM\SOFTWARE\Classes\CLSID\{5DA743EA-6725-4ADE-BF17-C328743011FD}\
   ProgID]
   • "@"="IEHlprObj.IEHlprObj.1"

– [HKLM\SOFTWARE\Classes\CLSID\
   {70F6E582-8FF4-4082-829E-C172131DE31A}]
   • "@"="IEHlprObj Class"

– [HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1\CLSID]
   • "@"="{5DA743EA-6725-4ADE-BF17-C328743011FD}"

– [HKLM\SOFTWARE\Classes\IEHlprObj.IEHlprObj.1]
   • "@"="IEHlprObj Class"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\0\win32]
   • "@"="%SYSDIR%\ieban0.dll"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {5DA7432B-6725-4ADE-BF17-C328743011FD}\1.0]
   • "@"="IEHelper 1.0 Type Library"

– [HKLM\SOFTWARE\Classes\CLSID\{5DA743EA-6725-4ADE-BF17-C328743011FD}\
   VersionIndependentProgID]
   • "@"="IEHlprObj.IEHlprObj"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {70F6E522-8FF4-4082-829E-C172131DE31A}\1.0\FLAGS]
   • "@"="0"

– [HKLM\SOFTWARE\Classes\Interface\
   {70F6E583-8FF4-4082-829E-C172131DE31A}\ProxyStubClsid]
   • "@"="{00020424-0000-0000-C000-000000000046}"

– [HKLM\SOFTWARE\Classes\Interface\
   {5DA743EB-6725-4ADE-BF17-C328743011FD}\TypeLib]
   • "@"="{5DA7432B-6725-4ADE-BF17-C328743011FD}"
   • "Version"="1.0"

– [HKLM\SOFTWARE\Classes\TypeLib\
   {5DA7432B-6725-4ADE-BF17-C328743011FD}\1.0\HELPDIR]
   • "@"="%SYSDIR%\"

– [HKLM\SOFTWARE\Classes\CLSID\{5DA743EA-6725-4ADE-BF17-C328743011FD}\
   InprocServer32]
   • "@"="%SYSDIR%\ahnie0.dll"
   • "ThreadingModel"="Apartment"



Urmatoarele chei din registri sunt modificate:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
   Noua valoare:
   • "Hidden"=dword:0x00000002
   • "ShowSuperHidden"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
   Noua valoare:
   • "NoDriveTypeAutoRun"=dword:0x00000091

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
   Folder\Hidden\SHOWALL]
   Noua valoare:
   • "CheckedValue"=dword:0x00000000

 Injectarea codului malware in alte procese –  Injecteaza fisierul urmator intr-un proces: %SYSDIR%\cyban0.dll

    Numele procesului:
   • explorer.exe



– Se injecteaza ca un thread remote intr-un proces.

    Numele procesului:
   • iexplore.exe



–  Injecteaza fisierul urmator intr-un proces: %SYSDIR%\ahnabc0.dll

    Numele procesului:
   • explorer.exe


 Detaliile fisierului Compresia fisierului:
Pentru a ingreuna detectia si a reduce marimea fisierului, este folosit un program de compresie runtime.

Description inserted by Petre Galan on Friday, July 30, 2010
Description updated by Andrei Ivanes on Tuesday, August 3, 2010

Back . . . .