Home / malwarePDF  

Adware.NaviPromo.Gen.5


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Adware.NaviPromo.Gen.5 is also known as Trojan:Win32/Skintrim.gen!D, Win32:SkiMorph.

Explanation :

The Adware.NaviPromo malware family is an advanced and difficult-to-detect adware that runs silently on the infected computer. It uses rootkit techniques to hide its files on disk and memory. It also hides its registry entries.

This malware comes bundled with several software which can be downloaded from the following sites and is installed along with them.
* netgamebox.com
* ediaplayer.com
* planet.com
* skinner.com
* stro.com
* cord.com
* ngerskinner.com

Adware.Navipromo is usually found in %SYSTEM% or C:Documents and Settings[USER]Local SettingsApplication Data

After first execution, it creates and hides one or more additional files in the same directory, ending with
* [random_name].dat
* [random_name]_nav.dat
* [random_name]_navps.dat
* [random_name]_navup.dat
* [random_name]_navtmp.dat
* [random_name]_m2s.xml
* [random_name]_m2s.zl

It injects code into explorer.exe process and connects to the internet. NaviPromo monitors your browsing habits, sends this data to its creators and then attacks your desktop with numerous pop-up advertisements that is somewhat related with the websites you usually visit.

It might also create: %WINDOWS% empmsksetup.log and download an executable ( self-update ) in %TEMPDIR%aup.tmp that contains attached the new random name of the file.

Adware.NaviPromo may also create the following registry subkey:
HKEY_LOCAL_MACHINESoftwaremc
or
HKEY_CURRENT_USERSoftwarefcn

which contains information about the adware, and adds one registry
value ( hidden ):
[random_name] = "[PATH_TO_FILE][random_name].exe" [random_name]

to one of the following registry subkeys:

HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun

Last update 21 November 2011

 

TOP