Home / malware TrojanDownloader:W97M/Donoff
First posted on 23 January 2015.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:W97M/Donoff.
Explanation :
Threat behavior
Installation
This threat is a malicious macro script for Microsoft Office files. The macro can download and run other malware on your PC.
It can be installed when you open an attachment to a spam email. For example, we have seen this threat attached to the following spam emails in a Word document (.doc file):
We have also seen the email attachment use file names such as:
- Invoice_007012_4_2015.doc
- Week_2invoice.doc
Payload
Downloads other malware
The infected .doc files contain a malicious macro script that, when opened, can download and run other malware onto your PC.
The malware uses social engineering tactics to try to get you to enable macro scripting when you view the document, as macro scripts are usually disabled by default in Microsoft Office.
We have seen the malware uses the following fake warnings in an attempt to get you to enable macros:
Once macros are enabled we have seen this threat contact the following URLs to download files, including malware:
- adobe-support.us/
.exe - bluefile.biz/files/
.exe - bringbackourgals.biz/php/
/ken.exe - bustedrubberbabies.com/js/
.exe - chinamanwoody.com/
.php - chopsecurity.ru/microsoft/word/
.com - climate54.ru/modules/mod_araticlhess/
.php - colfdoc.it/cart/
.exe - datnigga.website/
.exe - dhanophan.co.th/js/
.exe - getimgdcenter.ru/
.png - goldriverlinedancers.nl/components/dancers/
.exe - goo.gl/
- www.hohlik001.nazwa.pl/
.exe - iloveberniemovie.ru/
.png - internetincomeengine.net/
.exe - joeniclesd.hostingsiteforfree.com/
.exe - legendarydownloads.com/
.exe - managercomponent.usa.cc/errors/
.0.exe - offshorebags.asia/
.exe - omc.hostingsiteforfree.com/
.exe - papeleriaelcid.com/aurora/ajax/
.exe - rghost.net/download/57465888/967d4c206f2a944160ffcc0f2b889f90a506653d/
.exe - s1.directxex.net/uploads/
- socialnetchat.tk/uch/
.exe - u.to/
The downloaded malware is usually saved and run from %APPDATA% or %TEMP%. For example we have seen malware saved to the following locations:
- %APPDATA% \fdataupdate.com
- %APPDATA% \VTAYOVKKIET.exe
- %TEMP% \1101.exe
- %TEMP% \8fvk.exe
- %TEMP% \enu.exe
- %TEMP% \HZLAFFLTDDO.exe
- %TEMP% \msml.exe
- %TEMP% \NYHEFLJDPZR.exe
- %TEMP% \sentinel.exe
- %TEMP% \xml.exe
- %USERPROFILE% \EPGRE.exe
- %USERPROFILE% \fkjhlkj23.com
- %USERPROFILE% SHIPA.exe
- C:\JGSNUWKJRFC.exe
We have seen the following threats being downloaded:
- Backdoor:Win32/Fynloski.A
- Backdoor:Win32/Vawtrak
- Ransom:MSIL/Swappa.A
- Ransom:Win32/Teerac.A
- TrojanDownloader:Win32/Drixed.A
- Worm:Win32/Gamarue
Analysis by Ric Robielos
Symptoms
The following can indicate that you have this threat on your PC:
- You open an email attachment and see the following warning in the document:
Last update 23 January 2015