Home / malwarePDF  

Trojan.Agent.AAQK


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Trojan.Agent.AAQK is also known as Troj/FakeAV-CC, W32/Agent.AAQ!tr, Win32/Small.NEB, W32/Agent.GYHC, Trojan.Fakealert.1260.

Explanation :

The malware copies itself to
C:Documents and Settings\local settings emp under the name
__a00[some-hexa-digits].exe

and adds the following registry key:
HKCUSoftwareMicrosoftWindowsCurrentVersionRunA00[some-hexa-digits].exe
C:Documents and Settings\Local SettingsTemp\__a00[some-hexa-digits].exe

Aftewards, the trojan will drop a .dll file (in the directory from where it was run) under its original file name and extension followed by .dat. It will load this dll and will execute it's exported function named A.

Running that code will copy the dll in the system directory (C:windowssystem32) under a name of the form __c00[five-hexa-digits].dat and will set the following registry key:

HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotify\__c00[five-hexa-digits]
* Logon -> B
* Impersonate -> 0x00000000
* DllName -> C:WINDOWSsystem32\__c00[five-hexa-digits].dat
* Startup -> B
* Asynchronous -> 0x00000001

Also, it will create a mutex named vmc_mm and will download a file from a link that was down at the moment this description was made.

Last update 21 November 2011

 

TOP