需要修復電腦?
聘請專家
Virus:TR/Spy.ZBot.HB
Date discovered:01/09/2010
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:896.000 Bytes
MD5 checksum:ca740afab1bc3a6b884d8f40506a7da8
VDF version:7.10.04.238
IVDF version:7.10.11.68 - Wednesday, September 1, 2010

 General Aliases:
   •  Sophos: Mal/Agent-IE
   •  Bitdefender: Trojan.Generic.KD.32217
   •  Panda: Trj/Sinowal.WXO
   •  Eset: Win32/Spy.Zbot.NJ


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification
   • Steals information
   • Makes use of software vulnerability
      •  CVE-2007-1204
      •  MS07-019

 Files It copies itself to the following location:
   • %SYSDIR%\sdra64.exe



The following files are created:

%SYSDIR%\lowsec\user.ds
%SYSDIR%\lowsec\local.ds
%SYSDIR%\lowsec\user.ds.lll

 Registry It creates the following entry in order to bypass the Windows XP firewall:

– [HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
   FirewallPolicy\StandardProfile]
   • "EnableFirewall"=dword:0x00000000



The following registry keys are added:

– [HKEY_USERS\S-1-5-20\SOFTWARE\Microsoft\
   Protected Storage System Provider\S-1-5-20]
   • "Migrate"=dword:0x00000002

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network]
   • "UID"="%computer name%_001DAA3D"

– [HKEY_USERS\S-1-5-20\Software\Microsoft\
   Protected Storage System Provider\S-1-5-20\Data 2\Windows]
   • "Value"=hex:01,00,00,00,1C,00,00,00,03,00,00,00,C3,27,A1,10,BF,2D,8B,DE,C7,10,CD,CB,26,6D,90,34,DE,51,DF,FF,11,58,B7,45,10,00,00,00,89,3D,50,AD,A5,CF,68,A8,24,AE,9C,50,4F,CE,FB,3C,14,00,00,00,C6,6E,5C,0C,61,D1,67,62,E7,97,8F,47,ED,6F,87,F9,41,C0,9B,C5

– [HKEY_USERS\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\
   Network]
   • "UID"="%computer name%_001DBD57"

– [HKEY_USERS\.DEFAULT\software\microsoft\windows\currentversion\
   explorer\{35106240-D2F0-DB35-716E-127EB80A0299}]
   • "{3039636B-5F3D-6C64-6675-696870667265}"=hex:F7,09,F2,0D
   • "{33373039-3132-3864-6B30-303233343434}"=hex:47,09,F2,0D

– [HKEY_USERS\.DEFAULT\Software\Microsoft\
   Protected Storage System Provider\S-1-5-18\Data 2\Windows]
   • "Value"=hex:01,00,00,00,1C,00,00,00,03,00,00,00,76,A4,13,0B,EE,BB,BA,A6,65,40,F9,82,6F,2F,C6,07,69,20,FD,92,36,33,0A,EA,10,00,00,00,88,F2,ED,F5,9C,51,81,3E,99,80,43,85,7D,A5,4F,7D,14,00,00,00,86,B4,0A,71,D5,43,63,CA,5C,FF,9F,0E,13,1B,E5,E6,EF,AA,5D,4A

– [HKEY_USERS\S-1-5-19\SOFTWARE\Microsoft\
   Protected Storage System Provider\S-1-5-19]
   • "Migrate"=dword:0x00000002

– [HKEY_USERS\.DEFAULT\software\microsoft\windows\currentversion\
   explorer\{43BF8CD1-C5D5-2230-7BB2-98F22C2B7DC6}]
   • "{3039636B-5F3D-6C64-6675-696870667265}"=hex:F7,09,F2,0D
   • "{33373039-3132-3864-6B30-303233343434}"=hex:47,09,F2,0D

– [HKEY_USERS\S-1-5-19\Software\Microsoft\
   Protected Storage System Provider\S-1-5-19\Data 2\Windows]
   • "Value"=hex:01,00,00,00,1C,00,00,00,03,00,00,00,B5,22,D0,20,24,36,8A,F8,B1,5D,0D,2C,F3,99,98,46,8F,1D,E2,AF,3F,11,DB,D6,10,00,00,00,CD,A2,D0,3B,A8,18,52,9F,86,1D,33,31,B4,4E,20,F1,14,00,00,00,CE,58,EE,A8,EA,9F,7A,D0,0E,29,75,B9,82,16,9B,9B,BF,54,67,5C

– [HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\
   Protected Storage System Provider\S-1-5-18]
   • "Migrate"=dword:0x00000002

– [HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\
   Network]
   • "UID"="%computer name%_001DB78B"



The following registry keys are changed:

– [HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Start Page"=""

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   New value:
   • "userinit"="%SYSDIR%\userinit.exe,%SYSDIR%\sdra64.exe,"

– [HKEY_USERS\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\
   Winlogon]
   New value:
   • "ParseAutoexec"="1"

– [HKEY_USERS\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\
   Winlogon]
   New value:
   • "ParseAutoexec"="1"

– [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\
   Winlogon]
   New value:
   • "ParseAutoexec"="1"

– [HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Start Page"=""

 Stealing It tries to steal the following information:

– A logging routine is started after a website is visited:
   • https://onlineeast.bankofamerica.com/cgi-bin/ias/*/GotoWelcome

 Injection – It injects itself as a remote thread into a process.

    Process name:
   • winlogon.exe



– It injects itself as a remote thread into a process.

    Process name:
   • svchost.exe



– It injects itself as a remote thread into a process.

It is injected into all processes.


 Miscellaneous Accesses internet resources:
   • http://nascetur.com:81/wc/**********


Mutex:
It creates the following Mutexes:
   • _AVIRA_2110
   • _AVIRA_2101
   • _AVIRA_2109
   • _AVIRA_2108
   • _AVIRA_21099

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

說明撰寫者 Petre Galan 開啟 2011年2月28日星期一
說明更新者 Petre Galan 開啟 2011年2月28日星期一

返回 . . . .
https:// 為了你的安全,此視窗已加密。