Home / malwarePDF  

Trojan:Win32/Vundo.JD.dll


First posted on 11 May 2009.
Source: SecurityHome

Aliases :

Trojan:Win32/Vundo.JD.dll is also known as Also Known As:Win32/Vundo.BJF (CA), Trojan-Spy.Win32.Agent.fcr (Kaspersky), Trojan.Vundo (Symantec), Vundo.gen.o (McAfee).

Explanation :

Trojan:Win32/Vundo.JD.dll is a component of the greater Win32/Vundo family of trojans. Win32/Vundo is a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. Win32/Vundo is often distributed as a DLL file and installed on a computer as a Browser Helper Object (BHO) without a user's consent. The Vundo family uses advanced defensive and stealth techniques to escape detection and to hinder removal. This particular component is used to download and execute arbitrary files.

Symptoms
There are no obvious symptoms that indicate the presence of this malware on an affected machine.

Trojan:Win32/Vundo.JD.dll is a component of the greater Win32/Vundo family of trojans. Win32/Vundo is a multiple-component family of programs that deliver 'out of context' pop-up advertisements. They may also download and execute arbitrary files. Win32/Vundo is often distributed as a DLL file and installed on a computer as a Browser Helper Object (BHO) without a user's consent. The Vundo family uses advanced defensive and stealth techniques to escape detection and to hinder removal. This particular component is used to download and execute arbitrary files.

Installation
Trojan:Win32/Vundo.JD.dll is installed on an affected machine as a Browser Helper Object (BHO) without a user's consent. It may be dropped in the Windows system folder with a random file name, as in the following examples:

  • <system folder>dhfigfmu.dll
  • <system folder>adludfba.dll
  • <system folder>
    tqolgge.dll
  • It registers itself as a BHO with a randomly generated CLSID, for example:HKLMSOFTWAREMicrosoftWindowsCurrentVersionExplorerBrowser Helper Objects{493915C6-E232-464B-8F94-1F3E028970D5}
    HKLMSoftwareClassesCLSID{493915C6-E232-464B-8F94-1F3E028970D5}InprocServer32 Trojan:Win32/Vundo.JD.dll makes further modifications to the registry to ensure that it is loaded. It modifies the following entry to ensure that it is loaded by each Microsoft Windows-based application that is running in the current log on session:Adds value: AppInit_DLLs
    With data: "<system folder><Vundo.JD.dll filename>"
    To subkey: HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindows It modifies the following entry to load the dll at each Windows start:Adds value:<random symbols>
    With data: "rundll32 "Path<Vundo.JD.dll filename>.dll", a"
    To subkey:HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun The malware's dll may also be injected to %ProgramFiles%internet exploreriexplore.exe.

    Payload
    Downloads and Executes Arbitrary FilesTrojan:Win32/Vundo.JD.dll may attempt to connect to the following IP addresses in order to download and execute arbitrary files (possibly including additional malware):85.12.43.86
    85.12.43.75
    82.98.235.223
    85.17.166.170Additional InformationTrojan:Win32/Vundo.JD.dll may create a mutex to ensure that only one instance of the malware runs at any time. In the wild, we have observed mutexes with the following names being used:
    F7EA7058-FF87-4b08-A6D8-B0F0C2A4E185
    47C0D494-C0B5-4ed7-8EB6-B8EDADF2301C
    lockable_mutex70AAC06A-E8B6 Trojan:Win32/Vundo.JD.dll creates the following registry entries for its own use:HKLMSoftwareMicrosoftfias4013
    HKLMSoftwareMicrosoft
    dfa Please see our Win32/Vundo family analysis elsewhere in this encyclopedia for additional information on this family.


    Analysis by Vitaly Zaytsev

    Last update 11 May 2009

     

    TOP