Home / malware Virus:Win32/Expiro.gen!F
First posted on 29 November 2011.
Source: SecurityHomeAliases :
Virus:Win32/Expiro.gen!F is also known as Win32/Expiro.G (AhnLab), W32/Expiro.O (Command), W32/Expiro.W (Norman), Win32.Expiro.Gen.3 (VirusBuster), Win32/Expiro.W (AVG), Win32.Expiro.30 (Panda), Virus.Win32.Expiro (Ikarus), Virus.Win32.Expiro.w (Kaspersky), W32/Expiro.gen.h (McAfee), W32/Expiro-H (Sophos), W32.Xpiro.D (Symantec), PE_EXPIRO.RAP (Trend Micro).
Explanation :
Virus:Win32/Expiro.gen!F is a generic detection for variants of Win32/Expiro, a virus that infects executable files with .EXE extensions in all drives, and collects user credentials from an infected computer. It also allows backdoor access and control to the infected computer, and lowers Internet Explorer settings.
Top
Virus:Win32/Expiro.gen!F is a generic detection for variants of Win32/Expiro, a virus that infects executable files with .EXE extensions in all drives, and collects user credentials from an infected computer. It also allows backdoor access and control to the infected computer, and lowers Internet Explorer settings.
Installation
Virus:Win32/Expiro.gen!F ensures that only a single version of itself is running at any given time by creating the following mutexes:
- kkq-vx_mtx <incremental number>
- gazavat-svc
- gazavat-svc_ <number>
For example, kkq-vx_mtx17 to kkq-vx_mtx99, gazavat-svc_17, gazavat-svc_18.
Spreads via...
File infection
Virus:Win32/Expiro.gen!F infects executable files with .EXE extensions and files referenced by shortcut (LNK) files. It looks for EXE files that are registered as services, those that are located in the Programs folder in the Start Menu, the user's desktop, and the local Applications Data folder.
It also infects all EXE files found in drives C to Z.
Virus:Win32/Expiro.gen!F infects files by appending its virus code to these files. It may then create a copy of the infected file using the same file name but with the extension IVR. For example, if this virus infects the file "calc.exe", it may create an infected copy as "calc.ivr".
The virus also disables Windows File Protection in order to infect protected files.
Payload
Steals sensitive information
Virus:Win32/Expiro.gen!F collects the following sensitive information:
- Installed certificates
- Credentials stored by FileZilla
- Credentials stored by Windows Protected Storage
- Credentials entered by users in different windows, for example, in Internet Explorer
- Passwords stored by Internet Explorer, within the following registry entry: HKCU\Software\Microsoft\Internet Explorer\IntelliForms\Storage2
It logs the stolen credentials in the following non-malicious files:
- %localappdata%\kf<number>z32.dll , for example, kf17z32.dll
- %localappdata%\dfl<number>z32.dll , for example, dfl17z32.dll
- %localappdata%\wsr <number>zt32.dll, for example, wsr17zt32.dll
- %localappdata%\ <volume serial of the Windows system folder><number>.nls, for example, dcbfifcc17.nls
- %appdata%\p <number>_<number>.dll, for example, p17_17.dll, p18_18.dll
Allows backdoor access and control
Virus:Win32/Expiro.gen!F connects to a server to receive commands from a remote attacker.
Depending on the variant, Win32/Expiro has been observed to connect to the following servers:
- antiviral-tstlist.biz
- avcheck.biz
- avcheck.biz
- avcheck.ru
- avcheck.ru
- avcheckx2011.ru
- barclays.com
- cashing.cc
- cashing.cc
- directconnection.ws
- directconnection.ws
- ganzagroup.com
- ganzagroup.in
- gektar-promarenda.ru
- gronx-planets.ru
- hsbc.ca
- kgbrelaxclub.ru
- kidos-bank.ru
- laurentianbank.ca
- law-service2011.ru
- license-crewru.ru
- license-policy2012.ru
- lowlol-casting.ru
- ppshafromhugewar.ru
- samohodka-ww2.ru
- samohodka-ww3.ru
- skolkovo-bizrents2012.ru
- smellsliketervana.com
- verified.ru
- virtest.com
- virtest.com
- xverified.ru
Note: Some of the above servers may not be malicious.
At any given time, it can also generate pseudo-random '.com' and '.ru' set of domains such as the following:
- <char>decub-ydyg.ru
- <char>gefa-bugin.com
- <char>kegy-bikav.com
- <char>pykyb-aquh.ru
- <char>symi-betop.com
- <char>vypeb-yxav.ru
- <char>zuqib-ubyc.ru
- <char>cusa-bifik.com
- <char>fuvub-ohap.ru
- <char>jixab-ekew.ru
- <char>lizyb-ypud.ru
- <char>pibob-urok.ru
- <char>ridyb-ivar.ru
- <char>vofib-oxyx.ru
- <char>zojeb-abif.ru
- <char>bokib-efal.ru
- <char>famab-yjes.ru
- <char>hapub-uluz.ru
Where <char> is random character selected such as €˜h', €˜t', €˜v', and €˜r' (for example, rdecub-ydyg.ru, vcusa-bifik.com, and tjixab-ekew.ru).
It can perform any of the following actions, based on the commands of the remote attacker:
- Disable antivirus protection
- Collect and upload user credentials
- Terminate the malware process
- Download malware components
It also sends information about the infected computer every time it connects to the remote server:
- Operating System version information
- Windows Product ID
- Locale
- Volume serial number of drive C
Redirects website access
Virus:Win32/Expiro.gen!F installs a Firefox extension that redirects web access from certain sites to others.
Depending on the variant of Win32/Expiro, it is known to redirect to the following servers:
- advokat-spb18.ru
- attorney-at-jew.ru
- cannabis-anabioz.org
- da-zdra-per-ma.com
- fettucini-mushfood.biz
- ganzagroup.net
- gattling-firepower666.biz
- gosdep-mskcity.ru
- govt-comission2011.ru
- grilled-mushrooms.cc
- headshot-freelance.com
- hlop-v-lob.ru
- ivan-tarakanov1975.org
- japan-flowersx343.net
- jopa-s-ushami.biz
- kaspersky-antinod.biz
- kevlar-xguard.ru
- lasersquad1996.com
- maha-krishna-ashram.in
- mellsliketervana.com
- million-megadoz.com
- mobbine.com
- mossad-torg.ru
- nae-biznes.ru
- nsdap-party.org
- office-rents24.ru
- oil-sibtrans-gaz.ru
- rmobbine.com
- s350.in
- sanitar-lesa.ru
- save-galapagos-turtles.biz
- smellsliketervana.com
- xray-lagometer.org
- zae-biznes.com
- zionist-govt3000.com
Modifies browser settings
Virus:Win32/Expiro.gen!F makes the following registry modifications in order to change the security settings in Internet Explorer:
In subkeys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
Sets value: "1609"
With data: "0"
Sets value: "2103"
With data: "0"
Sets value: "1406"
With data: "0"
These settings allow unsecured content to be displayed in all zones and allow status bar updates via scripts.
Analysis by Rodel Finones
Last update 29 November 2011