Home / malware Trojan:Win32/Reveton
First posted on 11 September 2012.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Reveton.
Explanation :
Trojan:Win32/Reveton is a family of ransomware that targets users from certain countries. It locks your computer and displays a localized webpage that covers your desktop and demands the payment of a fine for the supposed possession of illicit material.
Installation
When run, some variants of Trojan:Win32/Reveton copy themselves to your computer using the following naming scheme:
%ALLUSERSPROFILE%\Application Data\<reverse string of the filename>.<reverse string of extension name>
for example, if the original file name is "malware.dll", the copy's name is "erawlam.lld".
Note: %ALLUSERSPROFILE% refers to a variable location that is determined by the malware by querying the operating system. The default location for the All Users Profile folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\All Users\Application Data". For Windows Vista and 7, the default location is "C:\ProgramData\Application Data".
Some variants of Trojan:Win32/Reveton create the following shortcut file in the Windows startup folder to ensure the trojan loads every time you log on:
<startup folder>\ctfmon.lnk, detected as Trojan:Win32/Reveton!lnk
Note: <startup folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the Startup folder for Windows 2000, XP, and 2003 is "%USERPROFILE%\Start Menu\Programs\Startup". For Windows Vista and 7, the default location is "%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup".
Manually clicking the shortcut will also run the trojan.
In some older variants of Trojan:Win32/Reveton, the trojan creates a shortcut file with the file name "<random file name>.dll.lnk".
Payload
Prevents you from accessing your desktop
As part of its payload, Trojan:Win32/Reveton displays a full-screen webpage that covers all other windows, rendering the computer unusable. The image is a fake warning pretending to be from a legitimate institution which demands the payment of a fine.
Paying the "fine" will not necessarily return your computer to a usable state, so this is not advisable.
Some examples of localized images that variants of Trojan:Win32/Reveton may display are reproduced here.
An image pretending to be from New Scotland Yard, Metropolitan Police and Strathclyde Police:
An image pretending to be from the Bundespolizei, or German Federal Police, National Cyber Crimes Unit:
An image pretending to be from the Federal Bureau of Investigation, or FBI:
An image pretending to be from the Computer Crime & Intellectual Property Section of the United States Department of Justice:
An image pretending to be from the Cuerpro Nacional De Policia, or National Police Corps of Spain:
An image pretending to be from the Guardia di Finanza, or Italian Financial Guard:
Downloads and runs other malware components
Trojan:Win32/Reveton can download and run customized DLL payloads, such as the following:
- "Lock.dll", which the trojan injects into browser process, including the following, to display the fraudulent message:
- chrome.exe
- firefox.exe
- iexplore.exe
- opera.exe
- "FileMem.dll", which is an encrypted file that may perform different payloads, including information-stealing routines, and may be detected as PWS:Win32/Reveton.
It may load these files into memory, rather than downloading them to a specific location on your computer.
In the wild, we have observed variants of Trojan:Win32/Reveton downloading these DLL files, images and other bundled malware from the following IP addresses, using port 80 or 443:
- 146.185.218.52
- 146.185.255.194
- 195.191.56.194
- 195.208.185.33
- 213.152.172.101
- 58.107.26.174
- 82.192.88.13
- 85.143.166.132
- 85.143.166.136
- whatwillber.com
- willber.com
Modifies Internet browser settings
Some variants of Trojan:Win32/Reveton may modify Internet Explorer settings by making a number of registry modifications.
Disable Internet Explorer security warnings:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "NoProtectedModeBanner"
With data: "1"
Lock the Internet Explorer toolbar:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Toolbar
Sets value: "Locked"
With data: "1"
Lower Internet zone security settings:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
Sets value: "1609"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
Sets value: "1609"
With data: "0"
Modifies system settings
Some variants may disable Task Manager by making the following registry modification:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Sets value: "DisableTaskMgr"
With data: "1"
Terminates processes
To prevent you from terminating the malware process, some variants of Trojan:Win32/Reveton may terminate the process "taskmgr.exe" as soon as it is run.
Related encyclopedia entries
Trojan:Win32/Reveton!lnk
PWS:Win32/Reveton
Analysis by Edgardo Diaz
Last update 11 September 2012