Home / malware PWS:Win32/QQpass.GG
First posted on 30 August 2013.
Source: MicrosoftAliases :
There are no other names known for PWS:Win32/QQpass.GG.
Explanation :
Threat behavior PWS:Win32/QQpass.GG is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.
Installation
PWS:Win32/QQpass.GG creates the following files on an affected computer:
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
- <system folder>\gggame.db
- c:\documents and settings\administrator\local settings\temp\10c8718f.bat
- c:\documents and settings\administrator\local settings\temp\dnfbox89.exe
- c:\documents and settings\administrator\local settings\temp\exp_t2316.exe
- c:\documents and settings\administrator\local settings\temp\nmue34d72378.exe
- c:\documents and settings\administrator\local settings\temp\z1.exe
- c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg1.jpg
- c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg2.jpg
- c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.dat
- c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.exe
- c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\lua5.1.dll
Payload
Contacts remote hosts
PWS:Win32/QQpass.GG may contact the following remote hosts:
- 183.60.203.62 using port 558
- ws617d3.CHEKFILES.COM using port 6668
Commonly, malware may contact a remote host for the following purposes:
- To confirm Internet connectivity
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 a740508d2eaf9545647c8bee2ca6978dbe0d658b.Symptoms
System changes
The following system changes may indicate the presence of this malware:
<system folder>\gggame.db
- The presence of the following files:
c:\documents and settings\administrator\local settings\temp\10c8718f.bat
c:\documents and settings\administrator\local settings\temp\dnfbox89.exe
c:\documents and settings\administrator\local settings\temp\exp_t2316.exe
c:\documents and settings\administrator\local settings\temp\nmue34d72378.exe
c:\documents and settings\administrator\local settings\temp\z1.exe
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg1.jpg
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg2.jpg
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.dat
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.exe
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\lua5.1.dllLast update 30 August 2013