Home / malwarePDF  

Trojan:Win32/Medfos.gen!A


First posted on 26 July 2012.
Source: Microsoft

Aliases :

Trojan:Win32/Medfos.gen!A is also known as Trojan.Win32.Jorik.Midhos.axf (Kaspersky), TR/Medfos.A.1090 (Avira), Win32/Medfos.AM trojan (ESET), Medfos.i (McAfee), TROJ_MEDFOS.UQ (Trend Micro).

Explanation :



Trojan:Win32/Medfos.gen!A is a malicious DLL component dropped and installed by other Win32/Medfos files. It tries to download and install arbitrary files in your computer.



Installation

Trojan:Win32/Medfos.gen!A is a Dynamic Link Library (DLL) file usually found in the "%AppData%" or "%TEMP%" folder with a random file name. The following are some of the file names that it has been found to have:

  • amutse.dll
  • apapsc.dll
  • brmgh.dll
  • csretb.dll
  • drfdv.dll
  • hecens.dll
  • hlpcnt.dll
  • mondi.dll
  • ndsas.dll
  • nsotb.dll
  • ohest.dll
  • sbtuil.dll


It may create the following registry entry to be able to load itself at every Windows start:

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random name>"
With data: "rundll32.exe <path and DLL malware file name>,<random characters>"

For example:

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "amutse"
With data: "rundll32.exe "%AppData%\amutse.dll",createinfowindow"

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "ndsas"
With data: "rundll32.exe "%AppData%\ndsas.dll",CreateLogFile"



Payload

Downloads arbitrary files

Trojan:Win32/Medfos.A connects to various servers using HTTP via port 80. Once connected, it attempts to download arbitrary files. This trojan has been observed to connect to the following servers:

  • filehostingdirect.net
  • greatfilehosting.com
  • midifilehosting.com


The sites were unavailable at the time of this writing.



Analysis by Wei Li

Last update 26 July 2012

 

TOP