Home / malwarePDF  

Trojan:Win32/Sefnit.AS


First posted on 29 October 2013.
Source: Microsoft

Aliases :

There are no other names known for Trojan:Win32/Sefnit.AS.

Explanation :

Threat behavior

Installation

Variants of this family can be installed by other malware or potentially unwanted software.

We have seen it included in software bundlers that install clean applications. The following is an example of a software bundler that silently installs Sefnit:



This variant copies itself to the following location:

  • <system folder>\TrustedInstaller.exe
  • <system folder>\uti.exe
  • <system folder>\wncs.dll
  • <system folder>\wnetprof.exe
  • <system folder>\wnetprofmon.exe


Note:
In some cases this file path may correspond to a legitimate clean file as well.

The trojan registers itself as a service in the registry. We have seen it use the names:

  • Windows Internet Name Service
  • Bluetooth LE Services Control Protocol
  • Network connection monitor
  • Windows Network Connection Service


Note:
In some cases these names may correspond to legitimate clean services.

It may add two scheduled jobs so it runs on a regular basis:

  • %windir% \Tasks\<job name>.job
  • %windir% \Tasks\<job name>2.job


Where <job name> changes depending on the variant, for example TrustedInstaller Update.job and TrustedInstaller Update 2.job.

Payload

Uses your PC for click fraud

This threat acts as a network proxy to perform click fraud.

A hacker can use your PC to relay Internet traffic that simulates a user browsing the Internet and clicking on ads. We have seen this threat using the open-source 3proxy service to do this. It does this in the background, so you are unlikely to notice anything unusual.

For more information about how Sefnit performs click fraud, see our blog Mevade and Sefnit: Stealthy click fraud, and to read about what click fraud is and how malware can use your PC to do it, see Another way Microsoft is disrupting the malware ecosystem.

Downloads other malware

The trojan connects to remote servers, known as C&C servers. When connected, it tries to download data that tells it what files to download or actions to take.
Some of the C&C domains known to be used by this trojan include:

  • assetsstatistic.com
  • fullstatistic.com
  • full-statistic.com
  • reserve-statistic.com
  • reservestatistic.net
  • securitystatistic.com
  • service-stat.com
  • service-statistic.com
  • service-update.net
  • stockstatistic.com
  • storestatistic.com
  • updservice.net


Additional information

This threats uses a C&C infrastructure that mixes HTTP and SSH. Standard HTPP is used to download and read an encrypted XML file that specifies download-and-run commands as well as the C&C server to be used for SSH. Clean library code from the PuTTY project is used to implement the SSH client.

This threat is only one component of Sefnit. Typically, up to three known components are installed around the same time on an infected PC. For details on these other components, please refer to the Win32/Sefnit family description.

You can also read more about the family in our blog Mevade and Sefnit: Stealthy click fraud.

Since August 2013, there has been a considerable increase in the Tor network's incoming connecting users - this is believed to be as result of the Sefnit family using Tor for its C&C communication. This is shown in the following graph from the Tor metrics portal:



Running files downloaded from peer-to-peer networks such as eMule, µTorrent, and Shareaza puts you at a high risk of being infected by trojans and other malware.



Analysis by Geoff McDonald

Symptoms

The following could indicate that you have this threat on your PC:

  • You have these files:
    • <system folder>\TrustedInstaller.exe
    • <system folder>\uti.exe
    • <system folder>\wncs.dll
    • <system folder>\wnetprof.exe
    • <system folder>\wnetprofmon.exe
  • You may see an outgoing SSH connection from your PC to an untrusted remote PC

Last update 29 October 2013

 

TOP

Malware :