Home / malware Win32/Shiotob
First posted on 09 October 2013.
Source: MicrosoftAliases :
There are no other names known for Win32/Shiotob.
Explanation :
Threat behavior
Installation
We have seen malware in the Win32/Shiotob family hidden in a .zip file and attached to spam email. We have seen the attachment use the following file names:
- Booking_Hotel_Reservation_Details_<some strings>.zip
- DHL-International-Delivery-Notification_<some strings>.zip
- DHL-Worldwide-Delivery-Notification-<some strings>.zip
- DHL_Express_POST-NOTIFICATION_<some strings>.zip
- DHL_ONLINE_SHIPPING_PREALERT_<some strings>.zip
In this case, <some strings> are random and can include dates and random text, for example DHL_Express_POST-NOTIFICATION_28FEB_4S1XFSR9.zip.
Variants of Win32/Shiotob can drop a copy of themselves with a random file name to one of the following folders:
- %APPDATA%
- %Systemdir%
Example file names include:
- execoumixer.exe
- playwd.exe
- winquser.exe
- winzhlp.exe
The trojan tries to hide from your security software by injecting its code into the following Windows processes:
- csrss.exe
- explore.exe
- iexplore.exe
- svchost.exe
It modifies the following registry entry so that it runs each time you start your PC:
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
Sets value: "Debugger"
With data: "<malware path>" for example C:\Windows\System32\execoumixer.exe
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "random value name" for example, "winzhlp" or "winquser"
With data: "<malware path> -autorun", for example "%APPDATA%\winquser.exe"
It creates the following registry subkey containing a binary value to save stolen information:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\<version number>\<random string>
Sets value: (default)
With data: "<binary values>"
Note: <version number> refers to your operating system version, for example "5.0"
Payload
Changes browser settings
The trojan modifies registry entries to change your Internet settings.
It disables the option to specify your own proxy for connecting to websites via local area network:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Modifies value: "ProxyEnable"
With data: "0"
It ensures that Internet Explorer always starts in online mode:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Modifies value: "GlobalUserOffline"
With data: "0"
Steals your sensitive information
This malware injects its code into the following Internet browser processes to monitor what you do online and steal your sensitive information, such as your user names and passwords:
- avant.exe
- chrome.exe
- firefox.exe
- iexplore.exe
- maxthon.exe
- mozilla.exe
- myie.exe
- opera.exe
It also injects its code into the following processes to steal your FTP and email user names and passwords:
- cftp.exe
- coreftp.exe
- coreftp.exe
- filezilla.exe
- ftpte.exe
- ftpte.exe
- FTPVoyager.exe
- msimn.exe
- outlook.exe
- SmartFTP.exe
- thebat.exe
- totalcmd.exe
- WinSCP.exe
Sends your information to a remote server
Some variants, such as TrojanSpy:Win32/Shiotob.A, collect the following information about your PC:
- Operating system version
- Service pack
- IP address
- User access control (UAC) status (on or off)
It also gathers email addresses from your PC's Windows Address Book.
The collected information is sent to remote web servers. We have seen this malware try to connect to the following sites:
- armyclub.netquickring.net
- bodoyizu.com
- ckirarhobrw.mrbasic.com
- eotukposed.sendsmtp.com
- ereso.net
- evishop.net
- firerice.com
- genubajom.servegame.com
- lahobenom.servegame.com
- nepcuibeg.sytes.net
- oraomana.cc
- peertag.com
- quickring.net
- ricepad.net
- rivadolti.sendsmtp.com
- ropohexa.com
- safeoil.net
- tamnia.com
- tekiharob.sytes.net
- ufoconklpef.sytes.net
- uvoceconeht.myftp.org
The remote server can also send further instructions to the malware, including:
- Download and run files
- Remove itself from the system
- Update itself
Analysis by Jonathan San Jose
SymptomsThe following could indicate that you have this threat on your PC:
- You receive these files as an attachment:
- Booking_Hotel_Reservation_Details_<some strings>.zip
- DHL-International-Delivery-Notification_<some strings>.zip
- DHL-Worldwide-Delivery-Notification-<some strings>.zip
- DHL_Express_POST-NOTIFICATION_<some strings>.zip
- DHL_ONLINE_SHIPPING_PREALERT_<some strings>.zip
- You have thee files in your computer:
- execoumixer.exe
- playwd.exe
- winquser.exe
- winzhlp.exe
- You see these entries or keys in your registry:
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
Sets value: "Debugger"
With data: "<malware path>" for example C:\Windows\System32\execoumixer.exe
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "random value name" for example, "winzhlp" or "winquser"
With data: "<malware path> -autorun", for example "%APPDATA%\winquser.exe"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\<version number>\<random string>
Sets value: (default)
With data: "<binary values>"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Modifies value: "ProxyEnable"
With data: "0"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Modifies value: "GlobalUserOffline"
With data: "0"
Last update 09 October 2013