Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:21/07/2010
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:442.880 Bytes
MD5 checksum:91babdcd784efa44e42be7c89ccaa7f7
IVDF version: - Thursday, February 11, 2010

 General Method of propagation:
    Autorun feature

   •  Sophos: Troj/Zbot-TQ
   •  Bitdefender: Trojan.Generic.KD.14346
   •  Panda: Trj/Sinowal.XDY
   •  Eset: Win32/Spy.Zbot.JF

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Downloads a malicious file
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following location:
   • %drive%\%executed file%

The following files are created:

%drive%\Autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%


It tries to download a file:

The location is the following:

 Registry It creates the following entry in order to bypass the Windows XP firewall:

The following registry keys are added:

[HKEY_USERS\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\
   • "UID"="%computer name%_001D7B0E"

   Protected Storage System Provider\S-1-5-18\Data 2\Windows]
   • "Value"=hex:01,00,00,00,1C,00,00,00,03,00,00,00,AF,76,EF,F6,A2,87,85,A2,C0,EB,E7,CF,CE,06,16,63,96,52,C7,95,FA,D0,1F,83,10,00,00,00,88,F2,ED,F5,9C,51,81,3E,99,80,43,85,7D,A5,4F,7D,14,00,00,00,21,13,EF,3B,1A,89,46,5F,E1,56,E2,9E,D5,E6,B2,4F,12,86,2E,CF

   Protected Storage System Provider\S-1-5-19]
   • "Migrate"=dword:0x00000002

   • "{3039636B-5F3D-6C64-6675-696870667265}"=hex:F7,09,F2,0D
   • "{33373039-3132-3864-6B30-303233343434}"=hex:47,09,F2,0D

   Protected Storage System Provider\S-1-5-19\Data 2\Windows]
   • "Value"=hex:01,00,00,00,1C,00,00,00,03,00,00,00,B1,A5,A0,94,E3,3C,CF,66,7D,9D,EE,E6,28,3D,8E,C7,E0,89,A6,DE,09,DA,A3,91,10,00,00,00,89,3D,50,AD,A5,CF,68,A8,24,AE,9C,50,4F,CE,FB,3C,14,00,00,00,C6,6E,5C,0C,61,D1,67,62,E7,97,8F,47,ED,6F,87,F9,41,C0,9B,C5

   Protected Storage System Provider\S-1-5-18]
   • "Migrate"=dword:0x00000002

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network]
   • "UID"="%computer name%_001D6FF3"

[HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\
   • "UID"="%computer name%_001D7949"

The following registry keys are changed:

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\
   New value:
   • "ParseAutoexec"="1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   New value:
   • "userinit"="%SYSDIR%\userinit.exe,%SYSDIR%\sdra64.exe,"

[HKEY_USERS\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\
   New value:
   • "ParseAutoexec"="1"

[HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Start Page"=""

 Network Infection Exploit:
It makes use of the following Exploit:
– MS04-007 (ASN.1 Vulnerability)

 Stealing It tries to steal the following information:

A logging routine is started after a website is visited:

 Injection It injects itself as a remote thread into a process.

    Process name:
   • winlogon.exe

It injects itself as a remote thread into a process.

    Process name:
   • scvhost.exe

It injects itself as a remote thread into a process.

It is injected into all processes.

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Friday, October 1, 2010
Description updated by Andrei Ivanes on Friday, October 8, 2010

Back . . . .