Home / malware Trojan:Win32/Zlob.GL
First posted on 04 February 2009.
Source: SecurityHomeAliases :
Trojan:Win32/Zlob.GL is also known as Also Known As:Win32/Zlob.EE (CA), Trojan.Agent.ALPJ (BitDefender), Trojan.Win32.Agent.bhol (Kaspersky), Puper (McAfee), Trojan.Zlob (Symantec).
Explanation :
Trojan:Win32/Zlob.GL is a dropped component of Trojan:Win32/Zlob.GL!dr. Win32/Zlob refers to a large multi-component family of malware that modifies Internet Explorer's settings, alters and redirects the user's default Internet search page and home page, and attempts to download and execute arbitrary files (including additional malicious software). The Win32/Zlob family has also been associated with rogue security programs that display misleading warnings regarding bogus malware infections.
Symptoms
System ChangesThe following system changes may indicate the presence of this malware:The presence of the following files:
svch_st.exe
svcnost.exe
Trojan:Win32/Zlob.GL is a dropped component of Trojan:Win32/Zlob.GL!dr. Win32/Zlob refers to a large multi-component family of malware that modifies Internet Explorer's settings, alters and redirects the user's default Internet search page and home page, and attempts to download and execute arbitrary files (including additional malicious software). The Win32/Zlob family has also been associated with rogue security programs that display misleading warnings regarding bogus malware infections.
Installation
Trojan:Win32/Zlob.GL arrives in the system as a dropped file of Trojan:Win32/Zlob.GL!dr and is usually installed in the Windows system folder using file names such as the following:svch_st.exe svcnost.exe It loads the following DLL file:
%APPDATA%Microsoftits.dll - detected as Trojan:Win32/Zlob.GL.dll, also dropped by Trojan:Win32/Zlob.GL!dr It creates the mutex "WinUpdaterMuXXX" and the data file %APPDATA%Microsoftprofile.dat.
Payload
Steals InformationTrojan:Win32/Zlob.GL checks if the following processes are running:explorer.exe firefox.exe opera.exe chrome.exe If any of these processes are found, it attempts to load the following DLL into the process space:
%APPDATA%Microsoftipdll.dll - detected as Trojan:Win32/Zlob.GL.dll, also dropped by Trojan:Win32/Zlob.GL!dr It checks for the values from the following registry keys, which may contain sensitive system information:
HKLMSOFTWAREMicrosoftWindowsCurrentVersionWindowsUpdateSusClientId
HKLMSOFTWAREMicrosoftWindows NTCurrentVersionProductId The collected data is sent to a remote attacker with the following format:
<domain>/xdone2.php?sacc=<number>&t=<number>&guid=<SusClientId>||<ProductId> where domains may be:bestworldguide.com i5i.in It can also connect to remote sites such as the domains indicated above to download and install additional malware or Zlob components.
Analysis by Elda DimakilingLast update 04 February 2009