Home / malware TrojanDownloader:Win32/Dofoil.gen!C
First posted on 25 February 2012.
Source: MicrosoftAliases :
TrojanDownloader:Win32/Dofoil.gen!C is also known as Win32/TrojanDownloader.Zurgop.AK trojan (ESET), Trojan.Win32.Yakes.kws (Kaspersky), Trojan.Smoaler!gen1 (Symantec).
Explanation :
TrojanDownloader:Win32/Dofoil.gen!C is a trojan downloader component of the Win32/Dofoil family that connects to a remote site to download and execute arbitrary files.
Top
TrojanDownloader:Win32/Dofoil.gen!C is a trojan downloader component of the Win32/Dofoil family that connects to a remote site to download and execute arbitrary files.
Installation
TrojanDownloader:Win32/Dofoil.gen!C may arrive as a ZIP attachment to spammed email messages. The email falsely claims to be regarding an airline ticket from American Airlines, or a package delivered via FedEx, UPS, or DHL. The attachment may have a file name similar to any of the following:
- Post_Label.exe
 - FedEx_Invoice.exe
 - AA_Ticket.exe
 - Gift_Card.exe
 
Upon execution, TrojanDownloader:Win32/Dofoil.gen!C may copy itself into the %AppData% folder using the same file name as a legitimate Windows file, for example:
- %AppData%\smss.exe
 - %AppData%\csrss.exe
 
Note that legitimate Windows files also named "smss.exe" and "csrss.exe" exist by default in the Windows system folder.
TrojanDownloader:Win32/Dofoil.gen!C may modify the system registry to ensure that its copy executes at every Windows start, for example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Sets value: "Classes" or "Microsoft" or "ODBC" or "Netscape"
With data: "%AppData%\smss.exe" or "%AppData%\csrss.exe"
Payload
Downloads and executes arbitrary files
TrojanDownloader:Win32/Dofoil.gen!C injects code into the "svchost.exe" system process and attempts to connect to a remote server. Once connected, the server sends encrypted configuration data as a response. The data contains the URLs and execution parameters for the downloaded files.
The downloaded files may be executed immediately after being written to disk in the %Temp% folder, or they may be loaded and injected directly into certain processes.
In the wild, TrojanDownloader:Win32/Dofoil.gen!C has been observed to contact one of the following remote servers:
- arsenalmaga.ru
 - astroz.in
 - callbackme.com
 - centosbaserus.su
 - deranosa789.ru
 - drozd.bz.cm
 - errousiz.tk
 - eurorack.ru
 - hant.in
 - karabasbarabas.eu
 - kkosokoko.ru
 - myopt.jino.ru
 - proftp.ws
 - rutoter.ru
 - support.surgery4991.info
 - thanksgiving2011.ru
 - trustmeplz.com
 - urbanmeyerohiostate.ru
 - wowexpert.ws
 - xaoz.net.ua
 
Analysis by Rex Plantado
Last update 25 February 2012
