Home / malware Worm:Win32/Esfury
First posted on 30 November 2010.
Source: SecurityHomeAliases :
Worm:Win32/Esfury is also known as Trojan.Win32.VBKrypt.umj (Kaspersky), W32/VBKrypt.AA (Norman), Trojan.Injector!mOVbCxSLuPw (VirusBuster), Trojan horse VB.2.AF (AVG), Worm/Esfury.A.266 (Avira), Trojan.Generic.4893617 (BitDefender), Trojan.Packed.21012 (Dr.Web), Worm.Win32.Esfury (Ikarus), Downloader-CJX.gen.j (McAfee), Trojan.Win32.Generic.5236547C (Rising AV), Worm.Win32.Esfury (Sunbelt Software), W32.Rontokbro!gen1 (Symantec), WORM_ESFURY.SMM (Trend Micro).
Explanation :
Worm:Win32/Esfury is a family of worms that may spread via MSN Live Messenger and removable drives. They modify the Hosts file and a number of security settings, as well as terminating and blocking access to a large number of processes. They may contact a remote server which may instruct them to download and execute arbitrary files.
Top
Worm:Win32/Esfury is a family of worms that may spread via MSN Live Messenger and removable drives. They modify the Hosts file and a number of security settings, as well as terminating and blocking access to a large number of processes. They may contact a remote server which may instruct them to download and execute arbitrary files. Installation When run, Worm:Win32/Esfury copies itself to a location such as %USERPROFILE%\<username>1\winlogon.exe (for example, C:\Documents and Settings\bob\bob1\winlogon.exe) or %USERPROFILE%\27f6471627473796e696d64614\winlogon.exe, and launches the new copy. This copy injects code into the system process "svchost.exe". It may create registry entries such as the following, to ensure that it runs at each system start: In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Sets value: NVIDIA Media Center Library With data: <location of malware> (for example, %USERPROFILE%\<username>1\winlogon.exe) In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Sets value: NVIDIA Media Center Library With data: <location of malware> (for example, %USERPROFILE%\<username>1\winlogon.exe) Spreads via€¦ Instant messaging The worm may send one of a number of messages to each of the user€™s MSN Live Messenger contacts, suggesting that they visit a certain website. Should the recipient do so, the site, which masquerades as a music site, suggests they download and install some audio player software. At the time of publication, the downloaded file was an updated copy of Worm:Win32/Esfury. Messages contain a string, randomly chosen, from one of the six below: Escucha Musica Online de Tus Generos Favoritos Hola!! En http://www.nueva*****.fm podrás encontrar: letras de canciones, vÃdeos de música, wallpapers música, foros de música Nueva*****.FM es el sitio de musica a la carta con mayor cantidad de canciones musicas y lyrics para escuchar en diferentes generos Escucha música gratis online, Internet radio y disfruta de los los últimos videos. Entérate de todas las novedades de la música en español Lo mejor de la música, tus artistas favoritos, fotos, videos gratis, radio, fotos, ultimas noticias. Musica del Recuerdo, portal dedicado exclusivamente a la musica del recuerdo, musica romantica, musica gratis y video clips. The chosen string is then followed by: Ingresa ahora a http://nueva*****.fm Los videos mas Calientes de la Red! a un solo Click! Visitame en http://nueva*****.fm Removable drives The malware periodically checks for the presence of removable drives on the affected systems, and, if found, will place a copy of itself at a location such as the following: \h3ojKiH9lvFefkO0mG6HlXplgLV3LYYJVfdZRr3dtLhEN80DnzEPQXQY2sziakx2axTnS4SA0447SPkbMnv4Qm\ S-4-7-01-4639107501-4494491267-104133574-7046\o3mrVQz9rDByh9hfKJ9v01t5z3m0s5hP01.exe Worm:Win32Esfury also places a file named "desktop.ini" in the same directory, which makes that directory appear in Windows Explorer as a recycle bin. It also places an "autorun.inf" file in the root directory of the affected drive. This has the effect that when the drive is newly attached to a system, an autoplay dialog will appear with a folder icon and the string "Abrir la carpeta para ver los archivos." If this option is selected, a copy of the malware will be launched. All of these files and directories have their attributes set to 'read only', 'hidden', and 'system'. Some variants also place a link file in the root directory of the targeted drive, with a file name such as "subst.lnk". This file links to the malware copy. Payload Contacts remote servers The malware contacts a number of servers in order to retrieve information about the latest version of the malware, or other commands. This allows it to download and execute an update for itself, or other arbitrary files. Servers contacted include the following: whos.amung.us www.cheaps1.info Modifies system settings The malware changes a number of system settings by making registry modifications such as the ones below:Disable User Account Control notifications:
In subkey: HKLM\SOFTWARE\Microsoft\Security Center
Sets value: "UacDisableNotify"
With data: "1"Disable certain Security Center settings and notifications: In subkey: HKLM\SOFTWARE\Microsoft\Security Center\Svc Sets value: "AntivirusDisableNotify" With data: "1" Sets value: "AntivirusOverrride" With data: "1" Sets value: "FirewallDisableNotify" With data: "1" Sets value: "FirewallOverrride" With data: "1" Sets value: "FirstRunDisabled" With data: "1" Sets value: "UpdatesDisableNotify" With data: "1" Sets value: "UacDisableNotify" With data: "1"
Allow the performing of operations that requires elevated privileges without consent or credentials: In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Sets value: "ConsentPromptBehaviorAdmin" With data: "0"
Disable the LUA (Least Privileged User Account), also known as the "administrator in Admin Approval Mode" user type: In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Sets value: "EnableLUA" With data: "0"
Note: Disabling the LUA allows all applications to run by default with all administrative privileges, without the user being prompted for explicit consent.Disable secure desktop prompting. All credential or consent prompting will occur on the interactive user's desktop: In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Sets value: "PromptOnSecureDesktop"
With data: "1"Disable the internal speaker beep: In subkey: HKCU\Control Panel\Sound Sets value: "Beep" With data: "no"
Remove the Run prompt from the Start Menu, and the Folder Option menu item from the Tools Menu of Windows Explorer: In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Sets value: "NoRun" With data: "1" Sets value: "NoFile" With data: "1" Sets value: "NoFolderOptions" With data: "1"
Disable System Restore and stop the System Restore service: In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore Sets value: "DisableSR" With data: "1"
In subkey: HKLM\SYSTEM\CurrentControlSet\Services\sr Sets value: "Start" With data: "4"Prevent the display of files that have 'system' and 'hidden' attributes, and the display of file name extensions in Windows Explorer: In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Sets value: "ShowSuperHidden" With data: "0" Sets value: "SuperHidden" With data: "1" Sets value: "Hidden" With data: "2" Sets value: "HideFileExt" With data: "3"
Disable the Windows Security Center service: In subkey: HKLM\SYSTEM\CurrentControlSet\Services\wscsvc Sets value: "Start" With data: "4"
Disable the Windows firewall: In subkey: HKLM\Software\Policies\Microsoft\WindowsFirewall\StandardProfile Sets value: "EnableFirewall" With data: "0€
In subkey: HKLM\Software\Policies\Microsoft\WindowsFirewall\DomainProfile Sets value: "EnableFirewall" With data: "0"Disable the command prompt: In subkey: HKCU\Software\Policies\Microsoft\Windows\System Sets value: "DisableCMD" With data: "1"
Disable automatic restart after downloading Windows updates: In subkey: HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU Sets value: "NoAutoRebootWithLoggedOnUsers" With data: "1"
Disable the Window Script Host: In subkey: HKLM\SOFTWARE\Microsoft\Windows Script Host\Settings In subkey: HKCU\SOFTWARE\Microsoft\Windows Script Host\Settings Sets value: "Enabled€ With data: "0"
Attempt to prevent the system from booting into Safe Mode by deleting the following registry key, and any subkeys it contains: Changes Internet Explorer start page The malware attempts to change Internet Explorer€™s start page and other default pages by making registry modifications similar to the following examples: In subkey: HKCU\Software\Microsoft\Internet Explorer\Main Sets value: "Start Page" With data: "http://g-3-a-k-0-x-8-6-e-n-d-p-4-s-d-x-g-6-9-v-9-n-v-2-3-2-8.-6-.j-z-0-3-0-u-u-x-f-1l-3-l-h-w-b-q-z-u-5-n-l-l-m-s-5-v-s-z-g.info" Sets value: "Local Page" With data: "http://h.-x-.u-l-c-6-e-p-a-a-0-z-m-s-m-00-v-2-i-7-5-f-l-7-7-l-t-j-h-h-9.info" Sets value: "Search Page" With data: "http://9.-.u-l-c-6-e-p-a-a-0-z-m-s-m-00-v-2-i-7-5-f-l-7-7-l-t-j-h-h-9.info" Sets value: "Default_Search_URL" With data: "http://4-1-6-f-k-g-d-n-8-9-a-k-f-f-h-y-4-9-n-1.-6-y-r-.a-l-v-d-z-o0-n-x-6-v-0-q-q-m-7-g-d-z-7-7-o-b-m-7-z-4-a-q-0.info" Sets value: "Default_Page_URL" With data: "http://4-1-x-.s-4-2-0-x-o-8-.j-z-0-3-0-u-u-x-f-1l-3-l-h-w-b-q-z-u-5-n-l-l-m-s-5-v-s-z-g.info" In subkey: HKLM\Software\Microsoft\Internet Explorer\Main Sets value: "Start Page" With data: "http://b-q-h.-.j-z-0-3-0-u-u-x-f-1l-3-l-h-w-b-q-z-u-5-n-l-l-m-s-5-v-s-z-g.info" Sets value: "Local Page" With data: "http://t-1-6-0-0-9-.k-8-.a-l-v-d-z-o0-n-x-6-v-0-q-q-m-7-g-d-z-7-7-o-b-m-7-z-4-a-q-0.info" Sets value: "Search Page" With data: "http://o-u-.1-7-g-5-f-z-s-9-.i-k-r-g-1-0-u-5-1-f-3-g-li-9-p-1-x-t-6-g-l-8-m-q-y-s-k-6-l.info" Sets value: "Default_Search_URL" With data: "http://d-e-g-4-8-g-8-3-9-c-j-4-8-9-m-i-e-0-3.-a-8-1-i-g-9-1-.u-l-c-6-e-p-a-a-0-z-m-s-m-00-v-2-i-7-5-f-l-7-7-l-t-j-h-h-9.info" Sets value: "Default_Page_URL" With data: "http://0-u-5-3-s-b-7-3.-2-t-9-j-j-.5-b-e-n-t-f-p-p-7-1-1-0-7-c-q-0-3-00-6-u-7-t-1-n-y-q-u-f-u.info" URLs such as these are randomly chosen from a short list contained within the malware. Closes windows The malware monitors open windows and attempts to close them if their title contains a string from a specified list. This list may include the following:
HKLM\SYSTEM\CurrentControlSet\Control\SafeBooterror hosts AdSense AdWords seguri gusano actuali Settings aware boot pajina advanced reg agnitum amon anti lock Caballo Troya Terminat Arovax Sweeper ants Destroy eset Malware blackice centinel command deerfield dvpinit etrust bot File scan gis HijackThis IniRem inoculate updat intercheck security odc kerio kill luke Memor moosoft murphy nai_vs_stat neowatch nod nvc Tray outpost pcinternet pestpatrol rav rtvr schscnt secureup Winspector superdat surfsecret sygate system monitor sistema tcactive tds running clea trojan troyan TuneUp Detective WinPatrol spy firewall Trend elimina viru espia saco cambiar homepage pagina spiware change trollano quitar quito kitar bloquear blokear deja infec borrar restaurar Kaspersky Active ZoneAlarm F-Secure Defender BullGuard Ashampoo CyberScrub Avast AVG F-Prot McAfee Panda Norman ArcaVir Norton Rising DrWeb Dr.Web Cillin Iolo VBA32 Sophos matar Zondex Vexira V3 Comodo Squared Ikarus ClamWin Quick Protector Guard Hunter VirIT E-Trust User Account Remove Hack jack Abacre Filterbit folder carpeta Terminates and blocks access to processes The malware may create a semaphore of "MSConfigRunning" in an attempt to prevent the startup of the MSConfig configuration tool. It also creates a large number of registry entries similar to the following: In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<file name of blocked file> Sets value: "Debugger" With data: "%USERPROFILE%\<username>1\winlogon.exe" For example: In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\_avp.exe Sets value: "Debugger" With data: "c:\documents and settings\bob\bob1\winlogon.exe" The registry keys may contain any of the file names listed below. This has the effect of ensuring that when an attempt is made to run any of the files in question, a copy of the malware is run instead. The malware also attempts to terminate processes with these file names if they are already running. Processes targeted by the malware may include the following:BullGuard.exe ChromeSetup.exe Diskmon.exe EHttpSrv.exe FPAVServer.exe Filemon.exe FirewallControlPanel.exe FirewallSettings.exe GenericRenosFix.exe GoogleToolbarInstaller_download_signed.exe HJTInstall.exe HostsChk.exe IEDFix.exe MSASCui.exe Netscape.exe Opera_964_int_Setup.exe Process.exe Procmon.exe Regmon.exe Restart.exe Safari.exe SmitfraudFix.exe SrchSTS.exe UCCLSID.exe UserAccountControlSettings.exe VACFix.exe WS2Fix.exe _avp.exe _avp32.exe _avpcc.exe _avpm.exe _findviru.exe a2servic.exe ackwin32.exe acs.exe advxdwin.exe agentsvr.exe agentw.exe ahnsd.exe alerter.exe alertsvc.exe alogserv.exe amon.exe amon9x.exe anti-trojan.exe antigen.exe antivirus.exe ants.exe apimonitor.exe aplica32.exe apvxdwin.exe ashWebSv.exe atcon.exe atguard.exe atro55en.exe atupdater.exe atwatch.exe aupdate.exe autodown.exe autotrace.exe autoupdate.exe avcenter.exe avconfig.exe avconsol.exe ave32.exe avgcc32.exe avgctrl.exe avgemc.exe avgnt.exe avgserv.exe avgserv9.exe avguard.exe avgw.exe avkpop.exe avkserv.exe avkservice.exe avkwcl9.exe avkwctl9.exe avnotify.exe avnt.exe avp.exe avp32.exe avpcc.exe avpdos32.exe avpexec.exe avpinst.exe avpm.exe avpmon.exe avpnt.exe avptc32.exe avpupd.exe avrescue.exe avscan avsched32.exe avshadow.exe avsynmgr.exe avupgsvc.exe avwebloader.exe avwin95.exe avwinnt.exe avwsc.exe avwupd32.exe avxmonitor9x.exe avxmonitornt.exe avxquar.exe avxw.exe azonealarm.exe bd_professional.exe bidef.exe bidserver.exe bipcp.exe bipcpevalsetup.exe bisp.exe blackd.exe blackice.exe boot.exe bootwarn.exe borg2.exe bs120.exe callmsi.exe ccapp.exe ccevtmgr.exe cclaw.exe ccpxysvc.exe ccsetmgr.exe ccshtdwn.exe cdp.exe cfgwiz.exe cfiadmin.exe cfiaudit.exe cfind.exe cfinet.exe cfinet32.exe chrome.exe clamauto.exe claw95.exe claw95cf.exe claw95ct.exe clean.exe cleaner.exe cleaner3.exe cleanpc.exe cmd.exe cmgrdian.exe cmon016.exe connectionmonitor.exe consent.exe cpd.exe cpdclnt.exe cpf.exe cpf9x206.exe cpfnt206.exe crashreporter.exe csinject.exe csinsm32.exe css1631.exe ctrl.exe cv.exe cwnb181.exe cwntdwmo.exe defalert.exe defscangui.exe defwatch.exe deputy.exe doors.exe dpf.exe drvins32.exe drwatson.exe drweb32.exe dumphive.exe dv95.exe dv95_o.exe dvp95.exe dvp95_0.exe earthagent.exe ecengine.exe ecls.exe ecmd.exe edi.exe efinet32.exe efpeadm.exe egui.exe ekrn.exe ent.exe esafe.exe escanh95.exe escanhnt.exe escanv95.exe espwatch.exe etrustcipe.exe evpn.exe ewido.exe exantivirus-cnet.exe exit.exe expert.exe explored.exe f-agnt95.exe f-prot.exe f-prot95.exe f-stopw.exe fa-setup.exe fact.exe fameh32.exe fast.exe fch32.exe fih32.exe findviru.exe firefox.exe firewall.exe fix-it.exe flowprotector.exe fnrb32.exe fp-win.exe fp-win_trial.exe fprot.exe fprot95.exe frw.exe fsaa.exe fsav.exe fsav32.exe fsav530stbyb.exe fsav530wtbyb.exe fsav95.exe fsave32.exe fsgk32.exe fslaunch.exe fsm32.exe fsma32.exe fsmb32.exe fssm32.exe fwenc.exe fwinstall.exe gbmenu.exe gbpoll.exe generics.exe gibe.exe gpedit.exe guard.exe guarddog.exe guardgui.exe guardhlp.exe hacktracersetup.exe helper.exe htlog.exe hwpe.exe iamapp.exe iamserv.exe iamstats.exe ibmasn.exe ibmavsp.exe icload95.exe icloadnt.exe icmon.exe icmoon.exe icssuppnt.exe icsupp.exe icsupp95.exe icsuppnt.exe iface.exe ifw2000.exe iomon98.exe iparmor.exe iris.exe isrv95.exe jammer.exe jed.exe jedi.exe kav8.0.0.357es.exe kavlite40eng.exe kavpers40eng.exe kavsvc.exe kerio-pf-213-en-win.exe kerio-wrl-421-en-win.exe kerio-wrp-421-en-win.exe killprocesssetup161.exe kis8.0.0.506latam.exe kpf.exe kpfw32.exe ldnetmon.exe ldpro.exe ldpromenu.exe ldscan.exe licmgr.exe localnet.exe lockdown.exe lockdown2000.exe lookout.exe lsetup.exe luall.exe luau.exe lucomserver.exe luinit.exe luspt.exe mcagent.exe mcmnhdlr.exe mcshield.exe mctool.exe mcuimgr.exe mcupdate.exe mcvsrte.exe mcvsshld.exe mdll.exe mfw2en.exe mfweng3.02d30.exe mgavrtcl.exe mgavrte.exe mghtml.exe mgui.exe minilog.exe monitor.exe monsys32.exe monsysnt.exe monwow.exe moolive.exe mpfagent.exe mpfservice.exe mpftray.exe mrflux.exe msblast.exe msconfig.exe msinfo32.exe msn.exe mspatch.exe mssmmc32.exe mu0311ad.exe mwatch.exe mxtask.exe n32scan.exe n32scanw.exe nai_vs_stat.exe nav32_loader.exe nav80try.exe navap.exe navapsvc.exe navapw32.exe navauto-protect.exe navdx.exe naveng.exe navengnavex15.exe navex15.exe navlu32.exe navnt.exe navrunr.exe navsched.exe navstub.exe navw.exe navw32.exe navwnt.exe nc2000.exe ncinst4.exe nd98spst.exe ndd32.exe ndntspst.exe neomonitor.exe neowatchlog.exe netarmor.exe netcfg.exe netinfo.exe netmon.exe netscanpro.exe netspyhunter-1.2.exe netstat.exe netutils.exe nisserv.exe nisum.exe nmain.exe nod32.exe normist.exe norton_internet_secu_3.0_407.exe notstart.exe npf40_tw_98_nt_me_2k.exe npfmessenger.exe nprotect.exe npscheck.exe npssvc.exe nsched32.exe ntdetect.exe ntrtscan.exe ntxconfig.exe nui.exe nupdate.exe nupgrade.exe nvapsvc.exe nvarch16.exe nvc95.exe nvlaunch.exe nvsvc32.exe nwinst4.exe nwservice.exe nwtool16.exe offguard.exe ogrc.exe opera.exe ostronet.exe outpost.exe outpostinstall.exe outpostproinstall.exe padmin.exe panixk.exe pathping.exe pavcl.exe pavproxy.exe pavsched.exe pavw.exe pcc2002s902.exe pcc2k_76_1436.exe pccclient.exe pccguide.exe pcciomon.exe pccmain.exe pccntmon.exe pccpfw.exe pccwin97.exe pccwin98.exe pcdsetup.exe pcfwallicon.exe pcip10117_0.exe pcscan.exe pcscanpdsetup.exe penis32.exe periscope.exe persfw.exe perswf.exe pf2.exe pfwadmin.exe ping.exe pingscan.exe platin.exe pop3trap.exe poproxy.exe popscan.exe portdetective.exe portmon.exe portmonitor.exe ppinupdt.exe pptbc.exe ppvstop.exe prckiller.exe processmonitor.exe procexp.exe procexplorerv1.0.exe programauditor.exe proport.exe protectx.exe pspf.exe purge.exe pview.exe pview95.exe qconsole.exe qserver.exe rapapp.exe rav.exe rav7.exe rav7win.exe rav8win32eng.exe realmon.exe regedit.exe regedt32.exe rescue.exe rescue32.exe route.exe routemon.exe rrguard.exe rshell.exe rstrui.exe rtvscn95.exe rulaunch.exe safeweb.exe sbserv.exe scan32.exe scan95.exe scanpm.exe sched.exe schedapp.exe scrscan.exe scvhosl.exe sd.exe sdclt.exe serv95.exe setup_flowprotector_us.exe setupvameeval.exe sgssfw32.exe sh.exe sharedaccess.exe shellspyinstall.exe shn.exe smc.exe sofi.exe spf.exe sphinx.exe spider.exe spysweeper.exe spyxx.exe srwatch.exe ss3edit.exe st2.exe supftrl.exe supporter5.exe sweep.exe sweep95.exe sweepnet.exe sweepsrv.sys.exe swnetsup.exe swsc.exe swxcacls.exe symproxysvc.exe symtray.exe sysdoc32.exe syshelp.exe taskkill.exe tasklist.exe taskmgr.exe taskmon.exe taumon.exe tauscan.exe tbscan.exe tc.exe tca.exe tcm.exe tcpsvs32.exe tds-3.exe tds2-98.exe tds2-nt.exe tds2.exe tfak.exe tfak5.exe tftpd.exe tgbob.exe titanin.exe titaninxp.exe tmlisten.exe tmntsrv.exe tracerpt.exe tracert.exe trjscan.exe trjsetup.exe trojantrap3.exe undoboot.exe unzip.exe update.exe update.exe updater.exe vbcmserv.exe vbcons.exe vbust.exe vbwin9x.exe vbwinntw.exe vccmserv.exe vcleaner.exe vcontrol.exe vcsetup.exe vet32.exe vet95.exe vet98.exe vettray.exe vfsetup.exe vir-help.exe virusmdpersonalfirewall.exe vmsrvc.exe vnlan300.exe vnpc3000.exe vpc32.exe vpc42.exe vpcmap.exe vpfw30s.exe vptray.exe vscan.exe vscan40.exe vscenu6.02d30.exe vsched.exe vsecomr.exe vshwin32.exe vsisetup.exe vsmain.exe vsmon.exe vsscan40.exe vsstat.exe vswin9xe.exe vswinntse.exe vswinperse.exe vvstat.exe w32dsm89.exe w9x.exe watchdog.exe webscan.exe webscanx.exe webtrap.exe wfindv32.exe wgfe95.exe whoswatchingme.exe wimmun32.exe wingate.exe winhlpp32.exe wink.exe winmgm32.exe winppr32.exe winrecon.exe winroute.exe winservices.exe winsfcm.exe wmias.exe wmiav.exe wnt.exe wradmin.exe wrctrl.exe wsbgate.exe wyvernworksfirewall.exe xpf202en.exe xscan.exe zapro.exe zapsetup3001.exe zatutor.exe zatutorzauinst.exe zauinst.exe zlh.exe zonalarm.exe zonalm2601.exe zonealarm.exe Modifies Hosts file Worm:Win32/Esfury modifies the Windows Hosts file, which may be located at <system folder> /drivers/etc/hosts. The local Hosts file overrides the DNS resolution of a TCP domain to a particular IP address. The malware modifies the file in order to redirect specified domains to different IP addresses. Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. It redirects domains, such as the following in order to display content of its own choosing, should the user attempt to visit URLs hosted by these domains:viabcp.com www.viabcp.com bcpzonasegura.viabcp.com www.produbanco.com produbanco.com www.pichincha.com pichincha.com wwwp1.pichincha.com wwwp2.pichincha.com wwwp3.pichincha.com wwwp4.pichincha.com wwww01.pichincha.com wwww02.pichincha.com wwww03.pichincha.com wwww04.pichincha.com bn.com.pe www.bn.com.pe zonasegura1.bn.com.pe www.zonasegura1.bn.com.pe peliculasid.com www.peliculasid.com It also redirects a number of mostly security-related domains, such as the following to a non-existent IP address, in an attempt to prevent the user from accessing content hosted by the domains:iniciorapido.info www.iniciorapido.info buscalo.in www.buscalo.in buscafacil.com www.buscafacil.com emsisoft.com ahnlab.com antivir.es antiy.net authentium.com avast.com avg.com bitdefender.com quickheal.com clamav.net comodo.com drweb.com aladdin.com ca.com f-prot.com f-secure.com fortinet.com gdata.es ikarus.at jiangmin.com kaspersky.com mcafee.com microsoft.com eset.es norman.com nprotect.com pandasecurity.com pctools.com prevx.com rising-global.com sophos.com sunbeltsoftware.com symantec.com hacksoft.com.pe trendmicro.com anti-virus.by hauri.net virusbuster.hu www.emsisoft.com www.ahnlab.com www.antivir.es www.antiy.net www.authentium.com www.avast.com www.avg.com www.bitdefender.com www.quickheal.com www.clamav.net www.comodo.com www.drweb.com www.aladdin.com www.ca.com www.f-prot.com www.f-secure.com www.fortinet.com www.gdata.es www.ikarus.at www.jiangmin.com www.kaspersky.com www.mcafee.com www.microsoft.com www.eset.es www.norman.com www.nprotect.com www.pandasecurity.com www.pctools.com www.prevx.com www.rising-global.com www.sophos.com www.sunbeltsoftware.com www.symantec.com www.hacksoft.com.pe www.trendmicro.com www.anti-virus.by www.hauri.net www.virusbuster.hu www.emsisoft.com www.anti-trojan.net malwarescan.emsisoft.com forum.emsisoft.com www.emsisoft.net www.emsisoft.it www.emsisoft.de www.anti-trojan-software.net mamutu.com www.emsisoft.es malwarescan.emsisoft.de ww.emsisoft.com www.emsisoft.fr www.emsisoft.nl onlinecheck.emsisoft.com onlinecheck.emsisoft.de www.emsisoft.org scan.anti-trojan.net www.trojaner.info onlinecheck.emsisoft.org onlinecheck.emsisoft.net blitzblank.com www.emsisoft.at www.emsisoft.jp www.mamutu.com malwarescan.emsisoft.es www.mamutu.de download5.emsisoft.com download1.emsisoft.com download4.emsisoft.com global.ahnlab.com www.hackshields.com www.internationalservicecheck.com www.irangoals.com ixomodels.com www.indielisboa.com www.latin-mass-society.org www.arpia.be www.owen.org www.prdouglas.co.uk www.zarya.info www.willsee.com halmapr.com karuna-shechen.org www.barder.com www.antivir.es www.buraka.tv www.dr-bull.com www.manchester-offices.co.uk saverssite.com canada.karuna-shechen.org developmentdrums.org www.imddomains.co.uk cutlines.org elblogdemanu.com ruben.bzin.net welkam.co.jp www.cambridge-steiner-school.co.uk naturesimages.net www.1stavenuelimousines.co.uk www.mtr-design.com dev.depeuter.org www.emeraldclassic.co.uk www.peterhearnwaste.co.uk etrr.co.uk www.avoncourt.com sarahmcconnellphotography.net www.ixomodels.com natsko.com www.nottinghampoetryseries.com www.sheffieldmind.co.uk ixostore.ixomodels.com www.flairweddings.co.uk www.fimasys.com cohartuk.com qqjkw.net vivo-austin.com www.freeality.com bestofewan.com www.handwritingforkids.com cowsmo.com www.2xlgames.com kimzimmer.net basetendencies.com trackingtheworld.com www.reviewsofbooks.com www.collectedcurios.com www.renningers.com ccslaughterspdx.com www.briarhurst.com www.smf.org ribbonwarehouse.com www.garryowen.com 45pounds.com isotopecomics.com roysephotos.com www.stadiumpage.com www.elvis-express.com www.tomorrowsedge.net www.beautybar.com pineleafboys.com www.mountainlakeslodge.com pvtc.org bhsbees.com baristamagazine.com www.gokidding.com defalcos.com www.celticmerchant.com www.hxproduction.com www.wellgousa.com blog.titanium-jewelry.com www.brightoctober.com hishomeforchildren.com www.phoenixtrikeworks.com www.professorbeyer.com www.secondchanceboxer.com www.residentphotography.com woottonfootball.com www.deborahshelton.net bobbondart.com www.authentium.com asap.authentium.com www.authentium.com.au avast.com www.avast.com files.avast.com download535.avast.com avg.com www.avg.com grisoft.com www.grisoft.com antivirus-tools.com archive.bitdefender.com avx.rob-have.net b-have.orgbitdefender-ar.com bitdefender.com bitdefender.org bitdefenderchina.com bitdefenderguatemala.com bitdefendermalaysia.com bitdefendertaiwan.com bitdefenderuruguay.com bitdefenderusa.com buy.bitdefender-es.com buy.bitdefender.com buy.bitdefender.de de.bitdefender.com fr.bitdefender.com futurenow.bitdefender.com it.bitdefender.com jobs.bitdefender.com kb.bitdefender.com kb.bitdefender.de kb.bitdefender.us latin.bitdefender.com linux.bitdefender.com malwarecity.com malwarecity.netmalwarecity.org malwarepedia.com neunet.orgnews.bitdefender.com nl.bitdefender.com renewals.bitdefender.com sales.bitdefender.com square.bitdefender.com store.bitdefender.com store.de.bitdefender.com us.bitdefender.com virusscanonline.net wedoantivirus.com www.antivirus-tools.com www.avx.ro www.bit-defender.de www.bitdefende.de www.bitdefender-es.com www.bitdefender.be www.bitdefender.cl www.bitdefender.co.uk www.bitdefender.com www.bitdefender.com.au www.bitdefender.com.sg www.bitdefender.com.tw www.bitdefender.com.vn www.bitdefender.de www.bitdefender.es www.bitdefender.fr www.bitdefender.hk www.bitdefender.us www.bitdefenderme.com www.malwarecity.com www.malwarecity.fr quickheal.com www.quickheal.com www.clamav.net cgi.clamav.net lurker.clamav.net wwws.clamav.net lists.clamav.net bugs.clamav.net system-cleaner.comodo.com backup.comodo.com www.comodoantispam.com easy-vpn.comodo.com www.trustlogo.com ztl.comodo.com www.livepcsupport.com www.whichssl.com www.trustix.com disk-encryption.comodo.com speedtest.comodo.com www.contentverification.com idauthority.com www.comodo.tv online-backup.comodo.com www.testmypcsecurity.com www.ccssforum.org i-vault.comodo.com internetsecurity.comodo.com www.comodopartners.com timestamp.comodoca.com secure-email.comodo.com timestamp.wosign.com rover800.gaima.co.uk www.nsclean.com www.contentverification.com new-estore.drweb.com support.drweb.com pda.drweb.com updates.drweb.com drweb.com vms.drweb.com solutions.drweb.com news.drweb.com my.drweb.com buy.drweb.com products.drweb.com new-support.drweb.com promotions.drweb.com network.drweb.com customers.drweb.com store.drweb.com company.drweb.com training.drweb.com license.drweb.com cureit.ru free.drweb.com info.drweb.com new-partners.drweb.com drweb.net new-company.drweb.com new-beta.drweb.com new-forum.drweb.com secure.av-desk.com www.av-desk.com new-solutions.drweb.com new-www.drweb.com www.freedrweb.ru daniloff.net drweb-inside.com drwebinside.com aladdin.com alladdin.ru chickensroamfree.com ealaddin.net ealaddin.orgeshop.aladdin.com secureme.com www.aks.com www.aladdin.com www.ealaddin.com www.ealaddin.com auwww.ealaddin.nl www.esafe.com www.hasp.se www.safenet-inc.com www3.safenet-inc.com www.ca.com cacomvip.ca.com www.netegrity.com search.ca.com cai.com www.f-prot.com frisk-software.com www.frisk.is www.frisk-software.com f-secure.com f-secure.frf-secure.hk f-secure.nlfsecure.com fsecure.nlwebyard.com www.f-secure.com www.fsecure.com www.virus.fi fortihero.com fortilog.com fortinet.co.at fortinet.com fortiprotect.com fortiwifi.com www.apsecure.com www.fortifed.com www.fortiid.com www.fortimail.com www.fortinet-apac.com www.fortinet.ch www.fortinet.co.il www.fortinet.com www.fortinet.com arwww.fortinet.cz www.fortinet.net www.fortinet.nl www.fortinet.sg www.fortinetuk.com www.secure-elements.com gdata.es www.gdata.es ikarus.at www.ikarus.at global.jiangmin.com jiangmin.com.cn jiangmin.com www.jiangmin.com.cn www.kaspersky.com forum.kaspersky.com support.kaspersky.co usa.kaspersky.com brazil.kaspersky.com latam.kaspersky.com kaspersky.com me.kaspersky.com images.kaspersky.com www.mcafee.com support.mcafee.com msr.mcafee.com home.mcafee.com networkassociates.com us.mcafee.com tr.mcafee.com au.mcafee.com mx.mcafee.com networkassociates.nai.com go.mcafee.com fr.mcafee.com uk.mcafee.com de.mcafee.com obscgi.mcafee.com nai.com www.entercept.com jp.mcafee.com mcafeeb2b.com cn.mcafee.com service.mcafee.com br.mcafee.com www.mcafee.at mcafeeretail.com it.mcafee.com tw.mcafee.com privacy.microsoft.com tempuri.org schemas.xmlsoap.org www.microsoft.com specs.xmlsoap.org www.eugrantsadvisor.ie schemas.microsoft.com encarta.msn.com www.sysinternals.com grv.microsoft.com www.xmlsoap.org www.eugrantsadvisor.se www.eugrantsadvisor.com research.microsoft.com www.engyro.com www.exchangeyourcareer.com www.eugrantsadvisor.de exchangeyourcareer.net eugrantsadvisor.de eugrantsadvisor.cz www.eset.es demos.eset.es descargas.eset.es blogs.protegerse.com eos.eset.es pedidos.protegerse.com reg-int.nod32-es.com reg.eset.es vicentevirtual.com cou85.com www.norman.com fsc.norman.com nprobeta.norman.com register.norman.com webadmin.norman.no sandbox.norman.com www.nprotect.com global.nprotect.com www.nprotect.co.kr www.npin.co.kr siren24.nprotect.com 15660808.co.kr biz.nprotect.com nprotect.net www.nprotect.com.br liveprotect.net nprotect.seoul.go.kr chollian.nprotect.co.kr www.pandasecurity.com research.pandasecurity.com support.pandasecurity.com pandalabs.pandasecurity.com pandasecurity.com mop.pandasecurity.com timeforyourbusi.pandasecurity.com cybercrime.pandasecurity.com free.pandasecurity.com cloudprotection.pandasecurity.com shop.pandasecurity.com soporte.pandasecurity.com together.pctools.com www.prevx.com info.prevx.com free.prevx.com spywarefiles.prevx.com spywaredlls.prevx.com shield.prevx.com www.prevx1.com howsafeismypc.com www.retento.com www.freerav.com www.rising-global.com www.risingav.com.au support.rising-global.com superboy2010.com.au www.sophos.com feeds.sophos.com esp.sophos.com cn.sophos.com tw.sophos.com kr.sophos.com sophos.com podcasts.sophos.com www.sunbeltsoftware.com go.sunbeltsoftware.com oem.sunbeltsoftware.com antispam.sunbeltsoftware.com antispyware.sunbeltsoftware.com antivirus.sunbeltsoftware.com sunbeltsoftware.com shop.sunbeltsoftware.com live.sunbeltsoftware.com firewall.sunbeltsoftware.com www.symantec.com security.symantec.com securityrespons.symantec.com service1.symantec.com enterprisesecur.symantec.com eval.symantec.com symantec.com definitions.symantec.com investor.symantec.com et.symantec.com sfdoccentral.symantec.com servicenews.symantec.com securityrespons.symantec.com sea.symantec.com go.symantec.com dell.symantec.com sun.symantec.com marian.symantec.com tms.symantec.com securitycheck.symantec.com smallbiz.symantec.com www.symantec.com visualtracking.symantec.com search.symantec.com liveupdate.symantec.com sitedirector.symantec.com edm.symantec.com hostedmailsecur.symantec.com www4.symantec.com education.symantec.com vos.symantec.com www.hacksoft.com.pe hacksoft.pe www.hacksoft.pe housecall.trendmicro.com www.trendmicro.com housecall65.trendmicro.com us.trendmicro.com blog.trendmicro.com emea.trendmicro.com housecall60.trendmicro.com jp.trendmicro.com de.trendmicro.com it.trendmicro.com itw.trendmicro.com esupport.trendmicro.com es.trendmicro.com br.trendmicro.com tw.trendmicro.com la.trendmicro.com uk.trendmicro.com ru.trendmicro.com smbstore.trendmicro.com apac.trendmicro.com store.trendmicro.com training.trendmicro.com trial.trendmicro.com ushousecall02.trendmicro.com subwiz.trendmicro.com go.trendmicro.com feeds.trendmicro.com channelpartner.trendmicro.com wtc.trendmicro.com shop.trendmicro.com fr.trendmicro.com threatinfo.trendmicro.com newsletters.trendmicro.com www.anti-virus.by bg.virusblokada.com www.vba.com.by beta.anti-virus.by www.bg.virusblokada.com www.hauri.net www.hauri.co.kr company.hauri.net www.globalhauri.com shop.hauri.co.kr hauri.co.kr pg.hauri.net esecurity.livecall.co.kr mall.hauri.co.kr company.hauri.co.kr haurijapan.com virobot.co.kr www.virusbuster.hu virusbuster.hu scanner.novirusthanks.org scanner2.novirusthanks.or novirusthanks.org www.novirusthanks.org virustotal.com www.virustotal.com virscan.org www.virscan.org virusscan.jotti.org jotti.org www.jotti.org viruschief.com www.viruschief.com scanner.virus.org virus.org www.virus.org scan4you.net www.scan4you.net avhide.com www.avhide.com anubis.iseclab.org iseclab.org www.iseclab.org threatexpert.com www.threatexpert.com
Analysis by David WoodLast update 30 November 2010