Home / malware TrojanDropper:Win32/Lisiu.A
First posted on 07 April 2010.
Source: SecurityHomeAliases :
TrojanDropper:Win32/Lisiu.A is also known as W32/TrojanX.CXAB (Authentium (Command)), Trojan.Win32.KillAV.fen (Kaspersky), Trojan.AVKill.1603 (Dr.Web), Win32/KillAV.NHH (ESET), TROJ_LISIU.SML (Trend Micro).
Explanation :
TrojanDropper:Win32/Lisiu.A is the detection for a malware that bundles and installs QVOD media player with other malware in the computer.
Top
TrojanDropper:Win32/Lisiu.A is the detection for a malware that bundles and installs QVOD media player with other malware in the computer. Installation Upon execution, TrojanDropper:Win32/Lisiu.A drops a QVOD media player installer executable as the following:c:\qvodsetupplus3.exe - installer for QVOD media player The trojan dropper also creates the following file, also detected as TrojanDropper:Win32/Lisiu.A:%SystemDrive%\111.exe It then launches the dropped files. The file "111.exe drops the following files in the Windows system folder, both of which are also detected as Trojan:Win32/Lisiu.A:<system folder>\mswsock32.dll <system folder>\imedllhost09.ime Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. TrojanDropper:Win32/Lisiu.A drops the following batch script file: <system folder>\del09.bat €“ used to delete the file "%SystemDrive%\111.exe". TrojanDropper:Win32/Lisiu.A may also create or modify, if they exist, the following registry entries, in effect installing its dropped components: Set value: "Ime File" With data: "imedllhost09.ime" To subkey: HKLM\SYSTEM\ControlSet001\Control\Keyboard Layouts\E0200804 Set value: "2" With data: "e0200804" To subkey: HKCU\Keyboard Layout\Preload Set value: "1001" With data: "<system folder>\mswsock.dll" To subkey: HKLM\SYSTEM\Setup\AllowStart\SPI_Pause Payload Modifies firewall settings TrojanDropper:Win32/Lisiu.A modifies the following registry entry to allow the QVOD media player to bypass the Windows firewall and potentially download updates of the software: Set value: "%SystemDrive%\QvodSetupPlus3.exe" With data: "%SystemDrive%\qvodsetupplus3.exe:*:enabled:qvod" To subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Modifies registry entries TrojanDropper:Win32/Lisiu.A may modify the following registry entries: Adds value: "PackedCatalogItem" With data: "c\idw\ytm2mwok2dl8c33-9f4753f53ea5}" In subkeys: HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000003 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000004 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000005 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000009 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000012 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000013 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000014 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000015 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000016 HKLM\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000017 Additional InformationQVOD media player is not in itself malicious; however it has been included in samples of TrojanDropper:Win32/Lisiu.A. The media player connects to a remote server by opening various ports, such as the following:UDP port 21775 UDP port 22262 TCP port 8090 UDP port 8090 TrojanDropper:Win32/Lisiu.A also attempts to connect to various hosts to download other files associated with QVOD media player. In the wild, this trojan has been observed to connect to the following hosts:agent.qvod.com stun.qvod.com stun01.sipphone.com track.qvod.com update.qvod.com Analysis by Wei LiLast update 07 April 2010