Home / malwarePDF  

Worm:MSIL/Murkados.A


First posted on 23 May 2013.
Source: Microsoft

Aliases :

Worm:MSIL/Murkados.A is also known as Trojan-Ransom.Win32.Blocker.avuh (Kaspersky), W32/Suspicious_Gen4.CWHRE (Norman), Found Luhe.MSIL.D (AVG), TR/Ransom.Blocker.avuh (Avira), Trojan.Generic.KDV.899344 (BitDefender), Trojan.AVKill.28785 (Dr.Web), MSIL/Agent.DI worm (ESET).

Explanation :



Installation

When run,Worm:MSIL/Murkados.A copies itself to c:\programdata\start.exe.

It searches your computer to find chrome.exe. This file indicates that you have the Chrome internet browser installed.

If it finds chrome.exe it renames it to new_chrome.exe. The worm then copies itself to chrome.exe.

Worm:MSIL/Murkados.A makes the following registry modifications to make sure it runs at each Windows start.

In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "Chrome New"
With data: "c:\programdata\start.exe"

Spreads via...

Removable drives

The worm checks for any removable drives connected to your computer. If it finds any removable drives with a security.exe file it copies itself onto the drive as security.exe.



Payload

Installs browser extensions

The worm downloads browser extensions for the Chrome browser. The downloaded file can change.

We observed the worm downloading the file flashplayer.crx.

This file uses JavaScript to change your Facebook experience, including €˜liking' the website "fcksuspend.com".

Closes Chrome internet browser

Each time it runs, the worm will try to download browser extensions from a remote host. The worm then closes the legitimate Chrome browser to apply the new extension.

The worm runs the following commands to close the Chrome internet browser:

  • taskkill /f/ im chrome.exe
  • taskkill/f/im start.exe


Contacts a remote server

Worm:MSIL/Murkados.A opens a real chrome browser (new_chrome.exe) and connects to the following server to download Chrome browser extension files (.crx):

  • socialmedya.<removed>

Last update 23 May 2013

 

TOP