Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Malex.E.966
Date discovered:15/07/2012
Type:Trojan
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low
File size:89632 Bytes
MD5 checksum:fa758a2a6ae4fbc1d0df65fed11bf968
VDF version:7.11.36.70 - Sunday, July 15, 2012
IVDF version:7.11.36.70 - Sunday, July 15, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: Generic.dx!bf3v
   •  Kaspersky: Trojan-PSW.Win32.Tepfer.aoxk
   •  Bitdefender: Gen:Variant.Kazy.73702
   •  Grisoft: Generic28.CFPU
   •  Eset: a variant of Win32/Kryptik.AIJX trojan
   •  GData: Gen:Variant.Kazy.73702
   •  Norman: Trojan W32/Troj_Generic.CXXCF


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Registry modification

 Files It copies itself to the following locations:
   • %appdata%\System32\csrss.exe
   • %appdata%\rundll32.exe
   • %appdata%\svchost.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Client Server Runtime Process"="C:\%appdata%\\System32\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

–  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Client Server Runtime Process"="C:\%appdata%\\System32\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\System32\\csrss.exe"

–  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\System32\\csrss.exe"



It creates the following entry in order to bypass the Windows XP firewall:

– [HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile\AuthorizedApplications\List]
   • "Client Server Runtime Process"="C:\%appdata%\\System32\\csrss.exe"
   • "Host-process Windows (Rundll32.exe)"="C:\%appdata%\\rundll32.exe"
   • "Service Host Process for Windows"="C:\%appdata%\\svchost.exe"

– [HKLM\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile\AuthorizedApplications\List]
   • "Host-process Windows (Rundll32.exe)"="C:\Documents and
      Settings\\vanciefancie\\Application Data\\System32\\csrss.exe"



The following registry key is added:

– [HKCU\Software\BC Clients]
   • "0"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53U>8==),a{1\"=;?2|,U$"
   • "1"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53U_4 - -a{\0x0192$6,"
   • "2"=".{RM
   • \"'$H/::l <-\0x008DR+=8(<.^]8(\"\";,K *%$NH]1\" / & B/nM-53U^7-!
   • 2&gH9+"
   • "d"="N{R149N:L,>%)o71H"

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS servers are contacted:
   • smtp.**********e.com
   • puzzle**********talking.com

Description inserted by Wensin Lee on Tuesday, July 17, 2012
Description updated by Wensin Lee on Tuesday, July 17, 2012

Back . . . .