Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Trafog.A.513
Date discovered:20/07/2011
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:131.584 Bytes
MD5 checksum:9EEC40F1469B8CBF7B1EF3EAAE616218
VDF version:7.11.12.21 - Wednesday, July 20, 2011
IVDF version:7.11.12.21 - Wednesday, July 20, 2011

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  TrendMicro: TROJ_SPNR.06F611
   •  Sophos: Troj/FakeAV-DVS
   •  Microsoft: Trojan:Win32/Trafog!rts


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • C:\Documents and Settings\Administrator\Start Menu\Programs\Startup\igfxtray.exe



It deletes the initially executed copy of itself.




It tries to download some files:

– The location is the following:
   • http://**********nkmonk.com/cfg/miniav.psd
At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********nkmonk.com/cfg/passw.psd
At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://**********nkmonk.com/cfg/stopav.psd
At the time of writing this file was not online for further investigation.

 Registry The following registry keys are changed:

Lower security settings from Internet Explorer:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\3]
   Old value:
   • "1609"=dword:00000001
   New value:
   • "1609"=dword:00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\3]
   Old value:
   • "1609"=dword:00000001
   New value:
   • "1609"=dword:00000000

 Injection – It injects itself as a thread into processes.

    All of the following processes:
   • explorer.exe
   • svchost.exe

   If successful, the malware process terminates while the injected part remains active.

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Andrei Ilie on Monday, September 12, 2011
Description updated by Andrei Ilie on Monday, September 12, 2011

Back . . . .