Home / malwarePDF  

Trojan:Win32/Waprox


First posted on 18 July 2012.
Source: Microsoft

Aliases :

Trojan:Win32/Waprox is also known as Gen:Variant.Zusy.Elzob.2492 (BitDefender), Mal/Cleaman-B (Sophos).

Explanation :



Trojan:Win32/Waprox is a trojan that connects to certain servers to receive commands from a remote attacker.



Installation

Trojan:Win32/Waprox may come in either an EXE or DLL form. When run, it drops and loads a copy of itself with either of the following formats:

  • %CommonProgramFiles%\<malware file name>\<malware file name>.exe
  • %CommonProgramFiles%\<malware file name>\<malware file name>.dll


where <malware file name> is constructed by concatenating and/or substituting strings from service names in your computer, for example:

For a service named "Microsoft Url History Service", Microsoft becomes MS. The resulting malware file name is then "MSUrlHistoryService.exe" or "MSUrlHistoryService.dll".

Trojan:Win32/Waprox creates the following registry entries so that it automatically runs every time Windows starts:

To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware file name>"
With data: ""%CommonProgramFiles%\<malware file name>\<malware file name>.exe" /<random parameter>" or "rundll32.exe "%CommonProgramFiles%\<malware file name>\<malware file name>.dll",<random parameter>"

For example:

To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "MSUrlHistoryService"
With data: ""%CommonProgramFiles%\MSUrlHistoryService\MSUrlHistoryService.exe" /<random parameter>" or "rundll32.exe "%CommonProgramFiles%\MSUrlHistoryService\MSUrlHistoryService.dll", <random_parameter>"



Payload

connects to a remote server

Trojan:Win32/Waprox connects to the following servers using either port 80 or 2222 to receive instructions from a remote attacker:

  • 84.84.80.47:11825
  • dance001-tst.net
  • dance001-tst.org
  • hungrypiggs.com
  • secondfatman.com




Analysis by Edgardo Diaz

Last update 18 July 2012

 

TOP