Home / malwarePDF  

TrojanProxy:Win32/Koobface.gen!K


First posted on 04 May 2010.
Source: SecurityHome

Aliases :

TrojanProxy:Win32/Koobface.gen!K is also known as TR/Proxy.Koobface.123904.K (Avira), Win32/Koobface.MF (CA), Win32/Tinxy.BI (ESET), Net-Worm.Win32.Koobface.fzi (Kaspersky), W32/Koobface.worm.z2 (McAfee), Koobface.GRI (Norman), Mal/Koobface-C (Sophos), Worm.Koobface.DOK (VirusBuster).

Explanation :

TrojanProxy:Win32/Koobface.gen!K is the generic detection for a DLL component of the Win32/Koobface family. It is installed as a system service and redirects the browser to an attacker-controlled server when certain legitimate Web sites are accessed.
Top

TrojanProxy:Win32/Koobface.gen!K is the generic detection for a DLL component of the Win32/Koobface family. It is installed as a system service and redirects the browser to an attacker-controlled server when certain legitimate Web sites are accessed. InstallationTrojanProxy:Win32/Koobface.gen!K may be dropped and installed by other components of the Win32/Koobface, for example, TrojanDropper:Win32/Koobface.J. The dropped file name and location may differ from example to example. One observed example is dropped as the following: %SystemRoot%\system32\clbcoko.dll It may also be installed as a system service, for example with the name 'swoko'. TrojanProxy:Win32/Koobface.gen!K attempts to create a system service for its device driver component if the device driver is not running. One observed example is the following: Service Name: "ql600oko"
Service Description: "Microsoft Shell Controller Passport Debug vmx86 Explorer"
Image Path: "%SystemRoot%\system32\drivers\mfoko.sys" Payload Redirects network trafficTrojanProxy:Win32/Koobface.gen!K listens in on a port (for example, 8085) to communicate with the device driver Koobface component, such as VirTool:WinNT/Koobface.gen!E. It redirects all traffic that comes from or goes to ports 53 and 80 to this port. Redirects Web site accessTrojanProxy:Win32/Koobface.gen!K works as a proxy to redirect access to certain Web sites. Whenever the user attempts to browse certain legitimate Web sites, the trojan loads an attacker-controlled server instead. Web sites that contain the following strings are made inaccessible to the user: aolcdn.com
ask
bing
gmodules.com
google
googleadservices
img.youtube.com
metacafe.com
sa.aol.com
search.aol
search.live
search.msn
search.mywebsearch
search.yahoo
sugg.search
toolbarqueries
yahooapis.com
yimg.com Instead, the browser resolves to an attacker-controlled remote server such as the following: 85.13.236.154 Connects to a remote serverTrojanProxy:Win32/Koobface.gen!K reports infection of the system to a remote server, such as '85.13.236.154'. Additional informationIf its files are deleted or moved, TrojanProxy:Win32/Koobface.gen!K attempts to recreate its dropped files and registry entries to ensure that it is still capable of running in the system.

Analysis by Shawn Wang

Last update 04 May 2010

 

TOP