Home / malwarePDF  

TrojanDownloader:Win32/Nimkey.A


First posted on 08 October 2010.
Source: SecurityHome

Aliases :

TrojanDownloader:Win32/Nimkey.A is also known as W32/Delfloader.B.gen!Eldorado (Authentium (C, Trojan-Downloader.Win32.Agent.ehcj (Kaspersky), Suspicious_Gen.KSCH (Norman), Trojan.DL.Agent.YKPA (VirusBuster), PSW.Generic8.KYM (AVG), Trojan.Heur.PT.fKW@bW@ZL1f (BitDefender), Trojan.DownLoad2.15075 (Dr.Web), Win32/Spy.Delf.OJO (ESET), Downloader.x!ebu (McAfee), Trojan.Win32.Generic.52283F03 (Rising AV), Infostealer.Nimkey (Symantec), TROJ_DLOAD.TZ (Trend Micro).

Explanation :

TrojanDownloader:Win32/Nimkey.A is a detection for a trojan that downloads and installs other files. To hide this activity, it opens a non-malicious PDF file from a legitimate website.
Top

TrojanDownloader:Win32/Nimkey.A is a detection for a trojan that downloads and installs other files. To hide this activity, it opens a non-malicious PDF file from a legitimate website. Installation When run, TrojanDownloader:Win32/Nimkey.A opens the following non-malicious PDF file to hide its malicious activity:

  • http://www.irs.gov/pub/irs-pdf/f941.pdf
  • Payload Downloads and executes other files When run, TrojanDownloader:Win32/Nimkey.A downloads the following files from a remote web server:
  • 1.jpg
  • 2.jpg
  • ChilkatCert_NT4.dll
  • extract_cert.exe
  • It executes its downloaded file "ChilkatCert_NT4.dll" as a DLL file or ActiveX control. It also runs and installs its downloaded file "extract_cert.exe" as a service with either of the following names:
  • WSALG2 or
  • Application Layer Gateway Service2
  • In the wild, TrojanDownloader:Win32/Nimkey.A has been observed to download from the following web servers:
  • 116.255.149.86
  • 77.78.240.87
  • 91.216.122.60
  • gimnazjum2orneta.pl
  • psbprzedborz.pl


  • Analysis by Jireh Sanico

    Last update 08 October 2010

     

    TOP