Home / malware Trojan:Win32/Mincinas.A
First posted on 02 November 2011.
Source: SecurityHomeAliases :
Trojan:Win32/Mincinas.A is also known as Trojan.MulDrop3.8118 (Dr.Web), Backdoor.Win32.Farfli (Ikarus), Generic.grp!cb (McAfee), Backdoor.Ripinip (Symantec).
Explanation :
Trojan:Win32/Mincinas.A is a trojan that injects payload code into other processes. The payload code is commonly stored on the affected computer as an encrypted file.
Top
Trojan:Win32/Mincinas.A is a trojan that injects code into other processes. The code is commonly stored on the affected computer as an encrypted file.
Installation
This trojan is installed by a dropper, detected as Trojan:Win32/Mincinas.A and may be present as files in the Windows system folder and Temporary Internet Files folder, as in the following examples:
- %TEMP%\tmp7.tmp
- %TEMP%\tmp8.tmp
- <system folder>\classic.fon
- <system folder>\luna.fon
It modifies the system registry so that its dropped files are registered as services:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\IPRIP\Parameters
Sets value: "ServiceDll"
With data: "%TEMP%\<malware file name>"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\IpFilterDriver
Sets value: "ImagePath"
With data: "%TEMP%\tmp8.tmp"
In subkey: HKLM\System\CurrentControlSet\Services\Redirection
Sets value: "ImagePath"
With data: "%TEMP%\tmp8.tmp"
The trojan is launched by the malware dropper by executing the following command line instruction:
net start IpFilterDriver
When the trojan executes, it reads data from the registry subkey to identify an installed and encrypted binary file:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\
Data: "Plus"
Value: "<system folder>\Luna.fon"
Trojan:Win32/Mincinas.A decrypts the binary file and injects its contents, which include payload instructions, into specified processes.
Payload
Communicates with a remote server
Trojan:Win32/Mincinas.A modifies the local firewall policy by adding an exception for certain ports, as in the following example:
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts
Sets value: "List"
With data: "1043:TCP:<original data>"
The trojan gathers the following types of information about the affected computer and sends this to a remote server using SSL:
- MAC address
- Hard drives or SCSI devices installed
- Operating system version
In the wild, this trojan was observed to communicate with a server named "look.com".
Analysis by Vincent Tiu
Last update 02 November 2011