Home / malware Trojan:Win32/Bublik.B
First posted on 05 May 2012.
Source: MicrosoftAliases :
Trojan:Win32/Bublik.B is also known as PWS-Zbot.gen.xj (McAfee), Troj/BredoZp-IP (Sophos).
Explanation :
Trojan:Win32/Bublik.B is a trojan that monitors and steals login credentials for online banking and other financial institutions. The trojan also forces the use of Internet Explorer if another web browser is launched on the affected computer.
Installation
Trojan:Win32/Bublik.B has been observed being distributed as an email attachment with the subject "Booking confirmation" and spoofed from an address from "booking.com". The attached file may be a ZIP archive such as "From-Booking-Com_Reservation-Details04261270703.zip".
If Trojan:Win32/Bublik.B is run, it drops a copy of the trojan as a randomly named file into the Windows system folder, as in the following examples:
- %windir%\System32\B48A1CB38B4C5E5D18A.exe
- %windir%\System32\defp.exe
It modifies the registry to execute the dropped malware copy when the Windows system executable "userinit.exe" runs, which occurs during Windows start.
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
Sets value: "Debugger"
With data: "<malware file name>" (e.g. "B48A1CB38B4C5E5D18A.exe")
To hide its presence, the trojan executes its payload in the context of the system process "csrss.exe". Trojan:Win32/Bublik.B also creates a random registry subkey with binary data, as in the following example:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\<version>\1D01061D\
Sets value: "(default)"
With data: ".0z._b¨Ã½nñãåÃýdé¥..xgcèo)sìt.r!.þ.~¤.ïð«1...ó.86.!9qx5°.qò.ýûé\´½Ã¯{î....$/çznr.eµ.&ç.±.û<.óð%äc.âvfc./ð.qi×.|ó.¬¸Ã¤uòà ø..).êm..|q.^n¬Ãµ«xæ.é¡Ã¯#...Ã¥lfw.s8.y*ê.e..üÃç&õÃ...q.·.[%Ã¥^õ#.¹Ã¤Ãº.æ·-ñwz.¬¥Ãonz"
Payload
Modifies Internet settings
Trojan:Win32/Bublik.B disables the use of an Internet proxy by changing registry data.
In subkey: HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Sets value: "ProxyEnable"
With data: "0"
Disables programs
Trojan:Win32/Bublik.B disables the use of the following web browsers and executes Internet Explorer instead:
- Google Chrome
- Netscape Navigator
- Opera
- Safari
Monitors and steals user credentials
The trojan injects code into the following processes for the purpose of stealing user credentials:
- thebat.exe
- msimn.exe
- iexplore.exe
- explorer.exe
- myie.exe
- firefox.exe
- mozilla.exe
- avant.exe
- maxthon.exe
- OUTLOOK.EXE
- ftpte.exe
- coreftp.exe
- filezilla.exe
- TOTALCMD.EXE
- cftp.exe
- FTPVoyager.exe
- SmartFTP.exe
- WinSCP.exe
Communicates with a remote server
This trojan gathers information about the affected computer, including:
- Operating system version
- Network configuration
- Windows Address Book
- Captured user credentials
Trojan:Win32/Bublik.B contacts one of the following remote servers to send the collected information and receive further instructions from an attacker:
- safeoil.net
- armyclub.netquickring.net
- quickring.net
- genubajom.servegame.com
- tekiharob.sytes.net
- rivadolti.sendsmtp.com
Analysis by Horea Coroiu
Last update 05 May 2012