Home / malwarePDF  

PWS:Win32/QQpass.EI.dll


First posted on 07 September 2010.
Source: SecurityHome

Aliases :

PWS:Win32/QQpass.EI.dll is also known as Win-Trojan/Agent.30720.ALO (AhnLab), Trojan-PSW.Win32.Agent.sdo (Kaspersky), W32/Malware.MSKU (Norman), Trojan horse Generic18.RGF (AVG), Trojan.Generic.4181448 (BitDefender), Trojan.PWS.Biaozhi.origin (Dr.Web), Trojan.SuspectCRC (Ikarus), Generic PWS.y!ctu (McAfee), Trojan.Win32.Generic.520773DF (Rising AV), Troj/Agent-MPR (Sophos), Trojan.Win32.Generic!BT (Sunbelt Software).

Explanation :

PWS:Win32/QQpass.EI.dll is a detection for certain obfuscated/protected password stealers. The malware may masquerade as a .JPG in an effort to trick the user into thinking it is an image and launch it.
Top

PWS:Win32/QQpass.EI.dll is a detection for certain obfuscated/protected password stealers. The malware may masquerade as a .JPG in an effort to trick the user into thinking it is an image and launch it. InstallationWhen executed, PWS:Win32/QQpass.EI.dll drops the following files:

  • m_user.dll under directory <system folder>
  • v3lght.dll under directory <system folder>
  • del2fa73.bat under directory %windir%
  • a modified version of sfc_os.dll
  • a modified version of comres.dll
  • Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. Using Windows hooks, PWS:Win32/QQpass.EI.dll injects the password stealing component into running processes. Payload Steals sensitive information The password stealer steals passwords from running applications and communicates to the following locations:
  • shenkgjiu.com/19da/dc/ndf.asp
  • shenkgjiu.com/19da/mz/maoxiandao.asp
  • shenkgjiu.com/19da/nt/nate.asp


  • Analysis by Daniel Radu

    Last update 07 September 2010

     

    TOP