Home / malware TrojanDownloader:Win32/Tracur.B
First posted on 30 June 2009.
Source: SecurityHomeAliases :
TrojanDownloader:Win32/Tracur.B is also known as Also Known As:Win32/Nugg.worm.143360 (AhnLab), Trojan.Tracur.A (BitDefender), P2P-Worm.Win32.nugg.bd (Kaspersky), Generic Downloader.x!cg (McAfee), W32/Agent.MPDD (Norman), W32/P2PWorm.AK.worm (Panda), Troj/Agent-INP (Sophos), Worm.P2P.Nugg.BV (VirusBuster).
Explanation :
TrojanDownloader:Win32/Tracur.B is a trojan component installed by TrojanDownloader:Win32/Tracur.A. This trojan component downloads and executes arbitrary files.
Symptoms
There are no obvious symptoms that indicate the presence of this malware on an affected machine.
TrojanDownloader:Win32/Tracur.B is a trojan component installed by TrojanDownloader:Win32/Tracur.A. This trojan component downloads and executes arbitrary files.
Installation
TrojanDownloader:Win32/Tracur.B is installed by TrojanDownloader:Win32/Tracur.A and is present in the Windows system folder as a randomly named file such as '<system folder>fde32.dll'. The registry is modified to run the dropped component at each Windows start. Adds value: "DllName"With data: "<system folder>fde32.dll"To subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyacc0e9de600 Adds value: "AppInit_Dlls"With data: "<system folder>fde32.dll"To subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWindows When Win32/Tracur.B executes, it create a unique mutex name "5113E92E5B1-D6FE-4804-9E28-FEF7FA8750A41864" to ensure only one malware instance runs at a time. Next it checks if the parent process is any of the following: explorer.exewinlogon.exeiexplore.exefirefox.exeopera.exechrome.exe If the parent process is not one of the above, the malware exits.
Payload
Downloads and Executes Arbitrary Files
TrojanDownloader:Win32/Tracur.B listens on an undefined TCP port (such as TCP port 1345) and waits for instructions from an attacker. The trojan may be instructed to perform the following actions:Download and execute arbitrary files Redirect the user's web browser to a URL of the attacker's choice, and maximize the Web browser window The malware creates a pipe named "\.pipe82781219D3C34ebcA476079C6EC9FDF40" that can allow an attacker access to steal data.Additional InformationThe registry may be modified with the following additional changes: Adds value: "acc0e9de"With data: "00 AF F8 70 BF CA C9 01"To subkey: HKLMSoftwareMicrosoftWindowsCurrentVersionExplorer
Analysis by Tim LiuLast update 30 June 2009