Home / malwarePDF  

TrojanDownloader:Win32/Plingky.B


First posted on 09 August 2011.
Source: SecurityHome

Aliases :

There are no other names known for TrojanDownloader:Win32/Plingky.B.

Explanation :

Trojandownloader:Win32/Plingky.B is a trojan that downloads and executes applications from a certain domain. The domains and applications are specified in a configuration file.


Top

Trojandownloader:Win32/Plingky.B is a trojan that downloads and executes applications from a certain domain. The domains and applications are specified in a configuration file.



Installation

Trojandownloader:Win32/Plingky.B is dropped along with the following configuration file:

  • %Temp%\install_config.tmp


It also creates the following registry entries:

In subkey: HKCU\Software\Microsoft\Direct3D\MostRecentApplication
Sets value: "Name"
With data: "<malware name>"

In subkey: HKLM\SOFTWARE\Macromedia
Sets value: "uid"
With data: "0"



Payload

Downloads other files
Trojandownloader:Win32/Plingky.B reads the contents of the configuration file dropped with it. This file contains a list of certain domains to connect to, and files to download. These files may be detected as other malware.

In the wild, Trojandownloader:Win32/Plingky.B has been known to connect to the following domains:

  • tc.<removed>mh.com
  • bofanggi.<removed>g.cn
  • ku<removed>zip.com
  • tuidl.0<removed>m.com
  • neirong.fun<removed>ion.com


The files it has been known to download may have the following names:

  • jm_setup_qvod.exe
  • 360mohesetup.exe
  • KuaiZip_setup_10034.exe
  • 9158chat_sp3.exe
  • FunshionInstall.exe




Analysis by Stefan Sellmer

Last update 09 August 2011

 

TOP