Home / malwarePDF  

TrojanDownloader:Win32/Drixed.B


First posted on 09 December 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:Win32/Drixed.B.

Explanation :

Threat behavior

Installation

This threat is installed by TrojanDownloadeR:W97M/Adnel into the %TEMP%.

Whenever the threat is run, it renames itself with the pattern edg.exe, for example edg1AF6.exe or edg10D.exe.

Payload

Downloads other files, including malware

This threat can connect to a remote server and download other files. We have seen it try to connect to the following servers:

  • http://194.146.136.1:8080/
  • http://84.92.26.50:8080/
  • http://87.106.246.201:8080/


We have seen it download a file .tmp or .tmp.exe, for example 4473.tmp or 3ED7.tmp.exe. It might download that file into %LOCALAPPDATA%.

In the wild, we detect these files as TrojanSpy:Win32/Ursnif.gen!K and TrojanDownloader:Win64/Drixed.B.

It injects this file into web prowser processes. At the time of analysis, the purpose of the web browser injection is unclear.

The threat might also download other files. In the wild, we have seen it try to download WinMail.exe.

Steals information about your PC

The threat gathers the following information about your PC:

  • Computer name by reading the registry entry HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName, ComputerName
  • Username by reading the registry entry HKCU\Volatile Environment, €œUSERNAME€
  • Operating system version
  • Installed software and version by reading the registry entries under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall


It encodes this information and sends it to the remote server before downloading or installing other files.



Analysis by Rex Plantado and HeungSoo David Kang

Symptoms

The following can indicate that you have this threat on your PC:

  • You have these files:

    %LOCALAPPDATA%\.tmp, for example 4473.tmp
    %LOCALAPPDATA%\.tmp.exe, for example 3ED7.tmp.exe

Last update 09 December 2014

 

TOP