Home / malwarePDF  

TrojanDownloader:Win32/Upatre.K


First posted on 03 January 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanDownloader:Win32/Upatre.K.

Explanation :

Threat behavior

Installation

TrojanDownloader:Win32/Upatre.K creates the following files on your computer:

  • c:\documents and settings\administrator\local settings\application data\nvidia corporation\update\nvupd32.exe - detected as TrojanDownloader:Win32/Upatre.C
  • c:\documents and settings\administrator\local settings\temp\nslf.tmp
  • c:\documents and settings\administrator\local settings\temp\nsr10.tmp\system.dll
The malware deletes the original copy of the worm that was executed when the system restarts by making the following registry modification:

Adds value: "PendingFileRenameOperations"
With data: ".exe"
To subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager

Payload

Contacts remote hosts
TrojanDownloader:Win32/Upatre.K may contact the following remote hosts using port 8000:

  • 81.169.187.148
  • 91.250.83.73
  • ckth.ethv.biz
  • fmwz.fvgd.biz
  • mtid.axvf.biz
  • mtid.ethv.biz
  • vbqq.axvf.biz
  • yixj.axvf.biz

Commonly, malware may contact a remote host for the following purposes:
  • To confirm Internet connectivity
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 6b4c9a52ab5fd11a464a2402629b1737119fd419.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • The presence of the following files:

    c:\documents and settings\administrator\local settings\application data\nvidia corporation\update\nvupd32.exe
    c:\documents and settings\administrator\local settings\temp\nslf.tmp
    c:\documents and settings\administrator\local settings\temp\nsr10.tmp\system.dll
  • You see these entries or keys in your registry:

    Adds value: "PendingFileRenameOperations"
    With data: ".exe"
    To subkey: HKLM\SYSTEM\CurrentControlSet\Control\Session Manager

Last update 03 January 2014

 

TOP