Home / malwarePDF  

TrojanDropper:Win32/Letrofen.A


First posted on 19 February 2009.
Source: SecurityHome

Aliases :

There are no other names known for TrojanDropper:Win32/Letrofen.A.

Explanation :

TrojanDropper:Win32/Letrofen.A is a trojan that drops Backdoor:Win32/Letrofen.A and may arrive in the system when a user browses certain malicious sites.

Symptoms
System ChangesThe following system changes may indicate the presence of this malware:

  • The presence of the following file:
    <system folder>winnet.dll
  • The presence of the following registry value and data:
    Value: "DllName"
    With data: "<system folder>winnet.dll"
    In subkey: HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifySystem


  • TrojanDropper:Win32/Letrofen.A is a trojan that drops Backdoor:Win32/Letrofen.A and may arrive in the system when a user browses certain malicious sites.

    Installation
    TrojanDropper:Win32/Letrofen.A may arrive in the system when a user browses certain malicious sites containing an exploit identified as Exploit:JS/Mult.BF. When a webpage that includes Exploit:JS/Mult.BF is loaded, the shellcode, which downloads this trojan dropper, is executed in the system.

    Payload
    Drops Other MalwareWhen TrojanDropper:Win32/Letrofen.A is executed by the exploit, it drops a backdoor trojan identified as Backdoor:Win32/Letrofen.A as the following file: <system folder>winnet.dll Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32. It modifies the registry so that the backdoor is executed at each Windows start. Adds value: "DllName"With data: "<system folder>winnet.dll"To subkey: HKLMSoftwareMicrosoftWindows NTCurrentVersionWinlogonNotifySystem

    Analysis by Patrick Nolan and Jireh Sanico

    Last update 19 February 2009

     

    TOP