Home / malwarePDF  

Win32/Upatre


First posted on 22 May 2014.
Source: Microsoft

Aliases :

There are no other names known for Win32/Upatre.

Explanation :

Threat behavior

Installation

The trojan may arrive as an attachment to a spammed email. In the wild, we have seen these emails being spread by the Win32/Cutwail family.

The following are some examples of the attachments:

  • -.zip
  • Case_.zip
  • Statement of Account.zip
  • TAX_.zip
  • USPS - Missed package delivery.zip
  • USPS_Label_.zip


Examples of the email message:







The threat creates the following file on your PC:

  • %TEMP% \.exe, where is a name hardcoded inside the malware file. For example, %TEMP%\jcbnaf.exe.


Payload


Download updates or other malware

The threat connects to a remote server to download updates and other malware. The server address is hardcoded in the malware.

In the wild, we have seen this malware download updates of itself and variants of Win32/Zbot. It downloads a file that it saves as .exe into the %TEMP% folder. For example, %TEMP%\jadghsu.exe.

We have seen it connect to the following servers to download the file:

  • appsredeem.com
  • backpackinglight.com.au
  • benefitanswers.co.uk
  • buyedit.com
  • emrlogistics.com
  • findsupplychainmanagement.com
  • hot-buys.org
  • idate.co.uk
  • imagevillage.co.uk
  • lingayasuniversity.edu.in
  • loquay.com
  • moraza.com.my
  • quantumlightconnections.com
  • ren7oaks.co.uk
  • thedivineobjects.com
  • wavetmc.com


Recent variants of Win32/Upatre use encryption to disguise the presence of Win32/Zbot malware.



Analysis by Patrick Estavillo

Symptoms

The following could indicate that you have this threat on your PC:

  • You get emails similar to those shown in the Payload section

Last update 22 May 2014

 

TOP