Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Dldr.Darkmegi.A
Date discovered:30/01/2012
Type:Trojan
Subtype:Downloader
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
File size:73728 Bytes
MD5 checksum:b3e7cab2ea9b8ee085214a9f52661297
VDF version:7.11.21.210 - Monday, January 30, 2012
IVDF version:7.11.21.210 - Monday, January 30, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Spy.Win32.Agent.bxix
   •  DrWeb: Trojan.PWS.Gamania.34873


Platforms / OS:
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7
   • Drops files
   • Drops a malicious file
   • Registry modification

 Files The following files are created:

%SYSDIR%\drivers\com32.sys Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: RKIT/Darkmegi.A

%SYSDIR%\del043.bat Furthermore it gets executed after it was fully created. This batch file is used to delete a file.

 Registry The following registry keys are added:

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_COM32]
   • ""=""

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_COM32\0000]
   • ""=""
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "ConfigFlags"="dword:0x00000000"

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_COM32\0000\Control]
   • ""=""
   • "*NewlyCreated*"="dword:0x00000000"
   • "ActiveService"="Com32"

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_COM32\0000]
   • "DeviceDesc"="Com32"
   • "Legacy"="dword:0x00000001"
   • "Service"="Com32"

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_COM32]
   • "NextInstance"="dword:0x00000001"

– [HKLM\SYSTEM\ControlSet001\Services\Com32]
   • ""=""
   • "DisplayName"="Com32"

– [HKLM\SYSTEM\ControlSet001\Services\Com32\Enum]
   • ""=""
   • "0"="Root\LEGACY_COM32\0000"
   • "Count"="dword:0x00000001"
   • "NextInstance"="dword:0x00000001"

– [HKLM\SYSTEM\ControlSet001\Services\Com32]
   • "ErrorControl"="dword:0x00000001"
   • "ImagePath"="System32\drivers\com32.sys"

– [HKLM\SYSTEM\ControlSet001\Services\Com32\Security]
   • ""=""
   • "Security"="hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • ,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,\
   • ,00,00,01,00,00,00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,\
   • ,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,00,00,18,00,ff,\
   • ,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
   • ,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • ,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
   • ,02,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,\
   • ,00,00,05,12,00,00,00"

– [HKLM\SYSTEM\ControlSet001\Services\Com32]
   • "Start"="dword:0x00000001"
   • "Type"="dword:0x00000001"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_COM32]
   • ""=""

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_COM32\0000]
   • ""=""
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "ConfigFlags"="dword:0x00000000"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_COM32\0000\Control]
   • ""=""
   • "*NewlyCreated*"="dword:0x00000000"
   • "ActiveService"="Com32"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_COM32\0000]
   • "DeviceDesc"="Com32"
   • "Legacy"="dword:0x00000001"
   • "Service"="Com32"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_COM32]
   • "NextInstance"="dword:0x00000001"

– [HKLM\SYSTEM\CurrentControlSet\Services\Com32]
   • ""=""
   • "DisplayName"="Com32"

– [HKLM\SYSTEM\CurrentControlSet\Services\Com32\Enum]
   • ""=""
   • "0"="Root\LEGACY_COM32\0000"
   • "Count"="dword:0x00000001"
   • "NextInstance"="dword:0x00000001"

– [HKLM\SYSTEM\CurrentControlSet\Services\Com32]
   • "ErrorControl"="dword:0x00000001"
   • "ImagePath"="System32\drivers\com32.sys"

– [HKLM\SYSTEM\CurrentControlSet\Services\Com32\Security]
   • ""=""
   • "Security"="hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • ,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,\
   • ,00,00,01,00,00,00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,\
   • ,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,00,00,18,00,ff,\
   • ,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
   • ,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • ,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
   • ,02,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,\
   • ,00,00,05,12,00,00,00"

– [HKLM\SYSTEM\CurrentControlSet\Services\Com32]
   • "Start"="dword:0x00000001"
   • "Type"="dword:0x00000001"

 Miscellaneous String:
Furthermore it contains the following strings:
   • \com32.dll
   • %s\userinit.exe
   • %s\FileDisk.sys
   • FileDisk
   • program files\Internet Explorer\IEXPLORE.EXE
   • %s\rundll32.exe %s\com32.dll GetInterface
   • %s\%X.bak
   • %s\com32.dll
   • Com32
   • System32\drivers\com32.sys
   • %s\drivers\com32.sys
   • userinit.exe
   • \explorer.exe
   • ipconfig.exe
   • \Device\FileDisk\FileDisk%u
   • Z:\
   • \del043.bat
   • \\.\NpcDark
   • Remon.exe
   • IRPro.exe
   • SpStart.exe
   • SeDebugPrivilege

Description inserted by Martin Muench on Monday, January 30, 2012
Description updated by Martin Muench on Monday, January 30, 2012

Back . . . .