Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Crypt.Gypikon.A.9
Date discovered:02/05/2012
Type:Trojan
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:52.224 Bytes
MD5 checksum:8950aecc4d90c7cc4c4b8e79b6a96260
VDF version:7.11.29.20 - Wednesday, May 2, 2012
IVDF version:7.11.29.20 - Wednesday, May 2, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Dropper.Win32.Injector.etcf
   •  Sophos: Troj/Bredo-WL
   •  Bitdefender: Trojan.Generic.KDV.608405
   •  Microsoft: Trojan:Win32/Matsnu
   •  Eset: a variant of Win32/Injector.QQN trojan
   •  GData: Trojan.Generic.KDV.608405


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Registry modification


Right after execution the following information is displayed:


 Files It copies itself to the following locations:
   • %APPDATA%\Jmndi\7D7C52F4D8812EB11AC8.exe
   • %TEMP%\%10 digit random character string% .pre
   • %SYSDIR%\AEA7B643D8812EB12BFE.exe



It deletes the initially executed copy of itself.

 Registry The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\ControlSet001\Control\Session Manager]
   • "PendingFileRenameOperations"="\??\%TEMP%\%10 digit random character string% .pre;"

 Injection – It injects itself into a process.

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS servers are contacted:
   • http://**********-a.com/**********.php?id=**********434E41564549&cmd=img
   • http://**********-a.com/**********.php?id=**********41564549&cmd=lfk&data=**********30WIIsfb#XNyxX5No#hQg0%2Bl85I9m0VmEP2IpcA
   •


Event handler:
It creates the following Event handlers:
   • CreateService
   • StartService
   • CreateRemoteThread
   • HttpOpenRequest
   • FtpOpenFile
   • InternetOpenUrl
   • InternetOpen
   • GetDriveType
   • CreateFile
   • CreateToolhelp32Snapshot
   • ShellExecute

 File details Programming language:
The malware program was written in Delphi.

Description inserted by Wensin Lee on Friday, May 4, 2012
Description updated by Wensin Lee on Friday, May 4, 2012

Back . . . .