Date discovered:05/10/2012
Type:Backdoor Server
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:323.584 Bytes
MD5 checksum:1a8b01302741f5e6b33de2918e06e4b7
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Sophos: Mal/Behav-034

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Can be used to execute malicious code
   • Registry modification

 Registry The following registry key is added:

– HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
   • LoadAppInit_DLLs=dword:00000001

The following registry key is changed:
   Old value:
   • AppInit_DLLs=""
   New value:
   • AppInit_DLLs="%malware execution directory%\%executed file%"

 Backdoor Contact server:
The following:
   • http://tra**********allmate/php/sprotector.php

This is done via the HTTP POST method using a PHP script.

 Miscellaneous String:
Furthermore it contains the following strings:
   • ^http[s]?://([^\/:\s]+)(:[^\/\s]+)?(\/?[^\s]*)$
   • global:ie:stealth
   • global:ff:stealth
   • \Mozilla\Firefox\Profiles\
   • ff:homepage_url
   • ff:search_url
   • boom crash!
   • iexplore.exe
   • firefox.exe
   • chrome.exe
   • new_chrome.exe

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

説明の挿入者 Martin Muench の 2012年10月6日土曜日
説明の更新者 Martin Muench の 2012年10月6日土曜日

戻る . . . .