Home / malwarePDF  

PWS:Win32/QQpass.GG


First posted on 30 August 2013.
Source: Microsoft

Aliases :

There are no other names known for PWS:Win32/QQpass.GG.

Explanation :

Threat behavior PWS:Win32/QQpass.GG is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.

Installation

PWS:Win32/QQpass.GG creates the following files on an affected computer:

  • <system folder>\gggame.db
  • c:\documents and settings\administrator\local settings\temp\10c8718f.bat
  • c:\documents and settings\administrator\local settings\temp\dnfbox89.exe
  • c:\documents and settings\administrator\local settings\temp\exp_t2316.exe
  • c:\documents and settings\administrator\local settings\temp\nmue34d72378.exe
  • c:\documents and settings\administrator\local settings\temp\z1.exe
  • c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg1.jpg
  • c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg2.jpg
  • c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.dat
  • c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.exe
  • c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\lua5.1.dll
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.

Payload

Contacts remote hosts
PWS:Win32/QQpass.GG may contact the following remote hosts:

  • 183.60.203.62 using port 558
  • ws617d3.CHEKFILES.COM using port 6668

Commonly, malware may contact a remote host for the following purposes:
  • To confirm Internet connectivity
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 a740508d2eaf9545647c8bee2ca6978dbe0d658b.Symptoms

System changes

The following system changes may indicate the presence of this malware:

  • The presence of the following files:

<system folder>\gggame.db
c:\documents and settings\administrator\local settings\temp\10c8718f.bat
c:\documents and settings\administrator\local settings\temp\dnfbox89.exe
c:\documents and settings\administrator\local settings\temp\exp_t2316.exe
c:\documents and settings\administrator\local settings\temp\nmue34d72378.exe
c:\documents and settings\administrator\local settings\temp\z1.exe
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg1.jpg
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irimg2.jpg
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.dat
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\irsetup.exe
c:\documents and settings\administrator\local settings\temp\_ir_sf_temp_0\lua5.1.dll

Last update 30 August 2013

 

TOP