Home / malware TrojanDownloader:Win32/Dofoil.gen!C
First posted on 25 February 2012.
Source: MicrosoftAliases :
TrojanDownloader:Win32/Dofoil.gen!C is also known as Win32/TrojanDownloader.Zurgop.AK trojan (ESET), Trojan.Win32.Yakes.kws (Kaspersky), Trojan.Smoaler!gen1 (Symantec).
Explanation :
TrojanDownloader:Win32/Dofoil.gen!C is a trojan downloader component of the Win32/Dofoil family that connects to a remote site to download and execute arbitrary files.
Top
TrojanDownloader:Win32/Dofoil.gen!C is a trojan downloader component of the Win32/Dofoil family that connects to a remote site to download and execute arbitrary files.
Installation
TrojanDownloader:Win32/Dofoil.gen!C may arrive as a ZIP attachment to spammed email messages. The email falsely claims to be regarding an airline ticket from American Airlines, or a package delivered via FedEx, UPS, or DHL. The attachment may have a file name similar to any of the following:
- Post_Label.exe
- FedEx_Invoice.exe
- AA_Ticket.exe
- Gift_Card.exe
Upon execution, TrojanDownloader:Win32/Dofoil.gen!C may copy itself into the %AppData% folder using the same file name as a legitimate Windows file, for example:
- %AppData%\smss.exe
- %AppData%\csrss.exe
Note that legitimate Windows files also named "smss.exe" and "csrss.exe" exist by default in the Windows system folder.
TrojanDownloader:Win32/Dofoil.gen!C may modify the system registry to ensure that its copy executes at every Windows start, for example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Sets value: "Classes" or "Microsoft" or "ODBC" or "Netscape"
With data: "%AppData%\smss.exe" or "%AppData%\csrss.exe"
Payload
Downloads and executes arbitrary files
TrojanDownloader:Win32/Dofoil.gen!C injects code into the "svchost.exe" system process and attempts to connect to a remote server. Once connected, the server sends encrypted configuration data as a response. The data contains the URLs and execution parameters for the downloaded files.
The downloaded files may be executed immediately after being written to disk in the %Temp% folder, or they may be loaded and injected directly into certain processes.
In the wild, TrojanDownloader:Win32/Dofoil.gen!C has been observed to contact one of the following remote servers:
- arsenalmaga.ru
- astroz.in
- callbackme.com
- centosbaserus.su
- deranosa789.ru
- drozd.bz.cm
- errousiz.tk
- eurorack.ru
- hant.in
- karabasbarabas.eu
- kkosokoko.ru
- myopt.jino.ru
- proftp.ws
- rutoter.ru
- support.surgery4991.info
- thanksgiving2011.ru
- trustmeplz.com
- urbanmeyerohiostate.ru
- wowexpert.ws
- xaoz.net.ua
Analysis by Rex Plantado
Last update 25 February 2012