Home / malware Trojan:Win32/Lodbak.gen!lnk
First posted on 15 February 2019.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Lodbak.gen!lnk.
Explanation :
Installation
This threat is installed by Trojan:Win32/Lodbak.A.
It uses a random file name in the following format:
~$< random>().lnk
For example, we have seen it use the following random file names:
(8GB).lnk ACTIVE BOOT (8GB).lnk FLASH DRIVE (8GB).lnk KINGSTON (16GB).lnk Removable Drive (16GB).lnk Removable Drive (8GB).lnk TOSHIBA (4GB).lnk TOSHIBA (8GB).lnk Transcend (8GB).lnk
This file uses the Drive icon, similar to that below, to trick you into thinking this is a legitimate file:
Payload
Runs other malware
This threat loads other malware. We have seen it loading variants from the Win32/Gamarue family of worms.
When the shortcut file runs, it loads the DLL file by using the rundll32.exe command.
For example, we have seen it run the following command:
%SystemRoot%
undll32.exe ~$mdqfshozrjgtjc.bak,nampcorlybeybehd
Once the DLL is loaded, it decrypts and runs the encrypted data IndexerVolumeGuid, which is then detected as Worm:Win32/Gamarue.
Analysis by Ric RobielosLast update 15 February 2019