Home / malware TrojanDownloader:Win32/Bradop.A
First posted on 25 May 2012.
Source: MicrosoftAliases :
TrojanDownloader:Win32/Bradop.A is also known as Gen:Variant.Barys.2297 (BitDefender), Win32/TrojanDownloader.Banload.QYV trojan (ESET), Trojan.Win32.Jorik.Banker.avo (Kaspersky).
Explanation :
TrojanDownloader:Win32/Bradop.A is the downloader component of the Win32/Bradop family of trojans that steal online banking credentials credentials for customers of Brazilian banks, as well as email credentials. It is distributed via spam email messages that contain links to its download.
Distribution
TrojanDownloader:Win32/Bradop.A is distributed via spammed email messages. The following are some examples of the spammed email messages that it arrives in:
Installation
TrojanDownloader:Win32/Bradop.A drops the following file, which is also detected as TrojanDownloader:Win32/Bradop.A and is the downloading component of this family:
%Temp%\strFileDestVar1.cpl
Note that in most TrojanDownloader:Win32/Bradop.A samples, the downloader uses this file name. However, some samples may also use random file names for the downloader, for example, "ouxz1357bdfgiln.cpl".
TrojanDownloader:Win32/Bradop.A checks if User Access Control (UAC) is enabled. If it is, TrojanDownloader:Win32/Bradop.A disables UAC and modifies the following registry entry so that its dropped file automatically runs every time Windows starts:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random text>"
With data: "%windir%\SysTem32\rundll32.exe Shell32.dll,Control_RunDLL "%temp%\strFileDestVar1.cpl""
If UAC is disabled, or if the operating system does not support UAC (for example, Windows 2000), TrojanDownloader:Win32/Bradop.A executes the following command to run its downloader file:
run %windir%\System32\rundll32.exe Shell32.dll,Control_RunDLL "%temp%\strFileDestVar1.cpl"
Note that in some samples, TrojanDownloader:Win32/Bradop.A restarts computers in which it has disabled UAC to ensure that the changes take effect.
Some variants of TrojanDownloader:Win32/Bradop.A open a webpage with Internet Explorer in an attempt to trick you into thinking that no malicious activity is taking place. Most of the time, the webpage is an article featuring Brazilian news or multimedia resources, for example:
- www.youtube.com/watch?v=afK5iFvYPfE
- acritica.uol.com.br/buzz/Manaus-Amazonas-Amazonia-Advogado-Dieckmann-objetivo-indenizacao-dificultar_0_698330219.html
- www.belasmensagens.com.br/amizade/do-pouco-que-eu-queria-2427.html
- www.belasmensagens.com.br/amizade/amizade-para-o-infinito-2394.html
- tvg.globo.com/bbb/bbb12/noticias/noticia/2012/03/bate-papo-gente-so-se-encontra-com-camera-rafa-ao-encontrar-renata.html
- natelinha.uol.com.br/bbb12/2012/02/29/bbb-12-monique-se-irrita-com-comentario-de-fabiana-152250.php
Payload
Downloads data-stealing malware
BHO component
TrojanDownloader:Win32/Bradop.A downloads a Browser Helper Object (BHO) component from a certain URL and saves it using the following format:
%windir%\<folder>\<file name>
where <folder> is a randomly-chosen name of an existing folder in your computer, and <file name> is a randomly-chosen name of an existing file in your computer, which is not in <folder>, for example:
C:\WINDOWS\Help\sfc.dll , where the existing sfc.dll is in <system folder>
TrojanDownloader:Win32/Bradop.A then registers the downloaded BHO; the BHO is detected as variants of TrojanSpy:Win32/Bradop.
TrojanDownloader:Win32/Bradop.A also opens a new instance of Internet Explorer to ensure that its BHO payload is run.
Data file
As part of its infection routine, TrojanDownloader:Win32/Bradop.A also creates a data file with either of the following names:
- <system folder>\inf\machinez.inf
- <system folder>\inf\machine1.inf
- <system folder>\inf\machineusa.inf
- <system folder>\inf\<computer name>.inf
This file contains information used by the BHO to locate a configuration file, a log file, and other data.
Configuration file
TrojanDownloader:Win32/Bradop.A comes bundled with a configuration file, which it drops as the following file:
%windir%\<folder>\<file name>
where <folder> is a randomly-chosen name of an existing folder in your computer, and <file name> is a randomly-chosen name of an existing file in your computer, which is not in <folder>, for example:
C:\WINDOWS\Help\d3d9.dll , where the existing d3d9.dll is in <system folder>
This file contains an alternate download location for the BHO, as well as the IP address and credentials of an attacker-controlled MySQL server in which to store the stolen information.
Analysis by Marian Radu
Last update 25 May 2012