Home / malwarePDF  

Trojan:MSIL/Spacekito.A


First posted on 15 February 2019.
Source: Microsoft

Aliases :

Trojan:MSIL/Spacekito.A is also known as Adware-Okit!F2AB011D4F26, winpe/Vittalia.PDB, MSIL/Spacekito.A, Trojan.Gen.2, Win32.SuspectCrc.

Explanation :

Installation

This threat gets onto your PC through a Nullsoft Scriptable Install System (NSIS) compiled installer. It is usually installed with the file name %APPDATA%okitspaceprotectpluginprotect.exe without your consent.

It is then registered as a service with the name "Protect your browser's extensions" and modifies these registry entries:

In subkey: HKLMSYSTEMCurrentControlSetServicessrvPlgProtect
Sets value: "Type"
With data: "dword:00000010"
Sets value: "Start"
With data: "dword:00000002"
Sets value: "ErrorControl"
With data: "dword:00000001"
Sets value: "ImagePath"
With data: "%AppData%okitspaceprotectPluginProtect.exe"
Sets value: "DisplayName"
With data: "Protect your browser's extensions"
Sets value: "ObjectName"
With data: "LocalSystem"

It might also create the following registry subkey as part of its installation routine:

Subkey: HKLMSOFTWAREPluginProtect

Payload

Steals your information

After the threat is registered as a service, it gets the following information about your PC:

Current date Default browser Installed antivirus program Installed browsers Operating system and version UserID

It sends this information to a remote server.

We've seen it connecting to the following servers to send information and download files:

baseflash.com okitspace.com media.vitkvitk.com media.vitjvitj.com

Installs plugins and displays ads in your browser

This threat downloads a .zip file called plugin.zip, which contains the plugins it installs.

Sample contents of plugin.zip are:

crxID - Contains text (Chrome ID) OKitSpace.crx - Chrome extension to be installed OKitSpace.crx.zip - Chrome extension to be installed OKitSpace.pem - Cert file needed to install the Chrome extension OKitSpace.dll - BHO to be installed on Internet Explorer OKitSpace.xpi - Firefox plugin to be installed version - Contains text (version of the plugin)

When these plugins are installed, they can display unwanted pop-up ads in Internet Explorer, Firefox, or Chrome browsers.

Here are some screenshots of what these plugins might look like:

In Internet Explorer:

In Firefox:
In Chrome:

The threat monitors all the plugins it installs. If a plugin is disabled, it immediately re-enables or activates the plugin. If the plugin is removed, the threat downloads and installs another copy of the plugin.

Analysis by Ricardo Robielos

Last update 15 February 2019

 

TOP