Home / malware Worm:Win32/Boychi.A
First posted on 25 August 2012.
Source: MicrosoftAliases :
Worm:Win32/Boychi.A is also known as BackDoor.DaVinci.1 (Dr.Web), Backdoor.Win32.Korablin.a (Kaspersky), TR/Spy.Bakefoe.A (Avira), W32.Crisis (Symantec).
Explanation :
Worm:Win32/Boychi.A is a password-stealing worm that is capable of spreading onto different platforms, including Windows mobile devices running WinCE, computers running the VMware virtual machine software, and USB drives.
Installation
Worm:Win32/Boychi.A may be downloaded from malicious or compromised websites, possibly as a drive-by-download or via an exploit.
When run, Worm:Win32/Boychi.A drops six files, one of which will be the worm's DLL component, into the folder "%USERPROFILE%\local settings\wxgj_b33", with a random file name. In the wild, we have observed the following file names:
- bq1ipprr.6rs
- expi7gss.r6v
- lj8rkdqq.c7h
- lvcy-c11.9gx
- rlfekkbb.-cw
- uanbpcnn.vlx
When run, Worm:Win32/Boychi.A drops six files, one of which will be the worm's DLL component, into the folder "%USERPROFILE%\local settings\jlc3v7we", with a random file name. In the wild, we have observed the following file names:
- 6eaqyffo.zik
- eiynz1gd.cfp
- izsroy7x.-mp
- lunsa3ci.bz7
- t2hbeam5.ouk
- wep1xpbu.wa-
Note: %USERPROFILE% refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the User Profile folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>" or "C:\Users\<user>". For Windows Vista and 7, the default location is "C:\Users\<user name>".
Worm:Win32/Boychi.A modifies the following registry entry to ensure that its copy runs at each Windows start:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random>", for example "*d-WBqPP"
With data: "%SystemRoot%\System32\rundll32.exe %USERPROFILE%\local settings\<random folder>\<random DLL name>"
Note: %SystemRoot% refers to a variable location that is determined by the malware by querying the operating system. The default location for the SystemRoot folder for Windows 2000, XP, 2003, Vista and 7 is "C:\Windows".
Spreads via...
Removable drives
Worm:Win32/Boychi.A copies itself to the following devices that are connected to your computer:
- Windows mobile device running WinCE
- USB drives
Worm:Win32/Boychi.A also copies itself to VMware virtual machines.
The worm then writes an Autorun configuration file named "autorun.inf" on removable drives, pointing to the worm copy.
It should also be noted that "autorun.inf" files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation media.
Payload
Injects code into processes
The malware injects the dropped DLL component into all available running processes to ensure that it will be run using the system process "rundll32.exe" and launched at each Windows start.
Steals sensitive information
The malware attempts to steal logon credentials from a number of different sources, which it sends to a remote host.
Note: At the time of analysis we were unable to determine the list of remote hosts.
Worm:Win32/Boychi.A may target the following sources for logon credentials:
- Chat clients
Trillian
Yahoo
MSN
AIM
Google Talk
Skype- Browsers
Internet Explorer
Chrome
Firefox
Opera- Mail clients
Outlook
Mozilla Thunderbird
Worm:Win32/Boychi.A may also capture additional information about your computer, including the following:
- Your operating system information
- Your Internet browsing history
- Your clipboard data
- Keystrokes
- Video/voice and screenshots
Analysis by Patrick Estavillo
Last update 25 August 2012