Home / malware Backdoor:Win32/Vawtrak.A
First posted on 21 May 2013.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Vawtrak.A.
Explanation :
Installation
When run, this backdoor malware drops its DLL component in %ALLUSERPROFILE%\AppData using a random file name with the DAT extension. Some of the file names it has been known to use are:
- degwbxm.dat
- dqxcovwm.dat
- ejrtzpaz.dat
- fvvifvwz.dat
- iopwark.dat
- uvfuvwog.dat
- wthejcy.dat
- xausgo.dat
- zlbgqk.dat
The DLL file is then injected to a running process, for example, any of the following:
- chrome.exe
- explorer.exe
- firefox.exe
- iexplore.exe
This malware creates the following registry entry so that its DLL component automatically runs every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<DLL file name>"
With data: "regsvr32.exe /s "%ALLUSERSPROFILE%\AppData\<DLL file name>.dat""
For example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "bqbclrtr"
With data: "regsvr32.exe /s "C:\Documents and Settings\All Users\Application Data\bqbclrtr.dat""
Payload
Changes Internet Explorer settings
This malware changes the following Internet Explorer settings:
Allow a remote attacker to access your computer
- Disables the home page warning message when Internet Explorer is opened for the first time:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "NoProtectedModeBanner"
With data: "dword:00000001"
- Sets tabs and frames to run within the same process in IE:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Main
Sets value: "TabProcGrowth"
With data: "dword:00000000"
- Lowers Internet zone security settings:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
Sets value: "2500"
With data: "dword:00000003"
This backdoor malware contacts a remote attacker by connecting to a certain server. Some of the servers it has been known to connect to are:
- 188.190.126.87
- 188.190.127.87
- 195.137.188.50
- 195.191.56.247
- 195.210.47.173
- afg.com.tw
- countdown.com.tw
- miison.com.tw
Once connected, the remote attacker may do the following:
- Log your keystrokes
- Take screenshots of your desktop
- Open a remote command shell
- Download and run arbitrary files
- find out what processes are running in your computer
- Get a list of your visited websites
- Delete your browser cache
- Delete arbitrary files
- Steal digital certificates saved in your computer
- Steal IE and Firefox cookies
- Start or stop processes like IE, Firefox, Outlook, Windows Explorer, Command prompt, and Task Manager
- Change Firefox settings
Steal information
This backdoor malware might steal information like your user name and password for certain websites. We have observed this malware to steal this information if you visit any of these websites:
- caixaebanking.cgd.pt
- chaseonline.chase.com
Note that the monitored websites might vary from sample to sample of this malware.
The stolen credentials are then sent to the remote attacker.
Analysis by Ric Robielos
Last update 21 May 2013