Home / malware Trojan.Spy.Agent.NKG
First posted on 21 November 2011.
Source: BitDefenderAliases :
Trojan.Spy.Agent.NKG is also known as I-Worm/VB.TP, Win32:VB-CMK, W32/MadCoffee.F.worm, 32.SillyWNSE, Email-Worm.Win32.VB.cb.
Explanation :
This trojan is received as a 98304 Byte-file, written in Visual Basic, having a Folder icon, in order to get the user to execute it.
Upon execution this worm file will copy itself as the following files:
%windir%svchost.exe
%windir%system32BttnServ.exe
The files are hidden
Next, the trojan will execute the file %windir%svchost.exe and also set the registry key HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun(Default) to %windir%svchost.exe
The received file will close it's process.
Upon running, %windir%svchost.exe will remain active in memory, and will delete itself from the hard disk
The trojan has an invisible window so will run in the background.
It ensures that it will be ran after the next reboot by setting the key HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunCPQEASYBTTN to %windir%system32BttnServ.exe
While running, the trojan will read any text box from any Internet Explorer window and store the contents of them. The read process is repeated everey 500 ms. The trojan will send the read informations using MAPI (an architecture for messaging applications)
The messages are sent to http://mail.madcoffee.com/index.php with the user OperationDefecha@yahoo.comLast update 21 November 2011