Home / malware TrojanDownloader:Win32/Matcash.L
First posted on 11 May 2009.
Source: SecurityHomeAliases :
TrojanDownloader:Win32/Matcash.L is also known as Also Known As:Generic Downloader.x (McAfee), Trojan.Retapu.D (BitDefender), Win32/Matcash.FH (CA), Trojan-Downloader.Win32.Agent.bfjx (Kaspersky), Downloader (Symantec).
Explanation :
TrojanDownloader:Win32/Matcash.L is a trojan that downloads and executes malware from predefined remote websites. The downloaded malware is usually other members of the Win32/Matcash family.
Symptoms
System ChangesThe following system changes may indicate the presence of this malware:The presence of the following files:
%AppData%comidlecomidle.exeThe presence of the following registry modifications:
Added value: "comidle"
With data: "%AppData%comidlecomidle.exe"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun
TrojanDownloader:Win32/Matcash.L is a trojan that downloads and executes malware from predefined remote websites. The downloaded malware is usually other members of the Win32/Matcash family.
Installation
This trojan may be installed by other malware. When run, it executes its payload that downloads other malware.
Payload
Downloads and Executes TrojanDownloader:Win32/Matcash.MIn the wild, this trojan has been observed to download malware from the following websites:
lhdzv.wwlax.comczzzz.wwlax.combugreport.waverevenue.com The downloaded malware is saved and run any of the following files: %Temp%s<random 3 characters>.tmp
%Temp%\_<random characters>.tmp One of the above temporary files is then copied as the following Matcash variant: %AppDataptidleptidle.exe - detected as TrojanDownloader:Win32/Matcash.M The registry is modified to execute the dropped copy at each Windows start. Adds value: "ptidle"
With data: "%AppData%ptidleptidle.exe"To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRunAdditional InformationTrojanDownloader:Win32/Matcash.L drops and executes the following batch script file to delete its currently running copy after it has performed its payload:
%Temp%at<random>.tmp.bat
Analysis by Wei LiLast update 11 May 2009