Home / malware Trojan:Win32/Ransom.EJ
First posted on 28 February 2012.
Source: MicrosoftAliases :
There are no other names known for Trojan:Win32/Ransom.EJ.
Explanation :
Trojan:Win32/Ransom.EJ is a member of the Trojan:Win32/Ransom family - a family of trojans that seizes control of the computer in which it is installed. This trojan prevents user access to websites by covering the web browser with a certain image. The image covering the webpage contains instructions for the user to send an SMS to a premium number in order to remove the image and unlock the web browser.
Top
Trojan:Win32/Ransom.EJ is a member of the Trojan:Win32/Ransom family - a family of trojans that seizes control of the computer in which it is installed. This trojan prevents user access to websites by covering the web browser with a certain image. The image covering the webpage contains instructions for the user to send an SMS to a premium number in order to remove the image and unlock the web browser.
Installation
Upon execution, Trojan:Win32/Ransom.EJ may drop a copy of itself as the following:
- %AppData%\mozilla\firefox\firefox.exe
- %AppData%\google\chrome\chrome.exe
- %AppData%\microsoft\dllhsts.exe
- %AppData%\identities\<random CLSID>\svghost.exe
It also creates the following registry entries so that its copy executes at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\Currentversion\Run
Sets value: "Firefox helper"
With data: %AppData%\mozilla\firefox\firefox.exe
Sets value: "Chrome"
With data: %AppData%\google\chrome\chrome.exe
Sets value: <random CLSID>
With data: %AppData%\identities\<random CLSID>\svghost.exe
Sets value: <random CLSID>
With data: %AppData%\microsoft\dllhsts.exe
As part of its clean-up routine, it creates the following files to remove/delete its copy after it has run:
- %Temp%\unlnk.bat
- %Temp%\r.bat
- %Temp%\clean.bat
Payload
Contacts remote hosts
Trojan:Win32/Ransom.EJ contacts the following remote hosts, that are not affiliated with Microsoft:
- security0301-microsoft<dot>com/index.php
- security-3761-microsoft<dot>com/index.php
- security-9976-microsoft<dot>com/index.php
- security-3405-microsoft<dot>com/index.php
- security-2374-microsoft<dot>com/index.php
- security-4809-microsoft<dot>com/index.php
- feyana.jino.ru
The trojan receives information from the above websites about what ransom message to display to affected users.
Additional information
Trojan:Win32/Ransom.EJ creates the following mutexes to ensure that only one copy of the malware is running on the infected computer at any one time:
- CHROME-HLP-< eight random alphanumeric characters >
- SAF_{< random CLSID >}
- msInternetExplorer-< six random alphanumeric characters >
Analysis by Zarestel Ferrer
Last update 28 February 2012