Home / malwarePDF  

TrojanDownloader:Win32/Gratem.A


First posted on 15 February 2019.
Source: Microsoft

Aliases :

TrojanDownloader:Win32/Gratem.A is also known as HEUR/Fakon.mwf, Trojan.Win32.Agentb.aqca, Trojan.DownLoader11.19812, W32/Agent.NPS!worm, W32.SillyFDC, Troj/DwnLdr-MTN.

Explanation :

Installation

When run, the malware searches its current folder for the file tpe64.dll. If the file is found, the malware reads its contents, decrypts the data, and runs the decrypted code in memory.

If tpe64.dll isn't found, the malware tries to download the following file every five seconds:

adnetwork33.redirectme.net///booswrap/layers.png

If successful, the downloaded blob is decrypted and run in memory.

The decrypted code creates the following shortcut link :

WindowManager.lnk  - detected as TrojanDownloader:Win32/Gratem.A!lnk

This shortcut points to the malware file: %ProgramData%WindowMandwm22.exe

The malware creates copies of itself in the following files:

%ProgramData % WindowMandwm22.exe - the original malware file %ProgramData% WindowMan pe64.dll - the encrypted blob %ProgramData% WindowManx22.dd Payload

Connects to a remote host

We have seen this threat connect to the following remote hosts to check for an Internet connection: 

74.125..112 74.125..113 74.125..114 74.125..115 74.125..116 129.42..1 198.133..25 207.46..32 207.46..182

Downloads files

We have seen the malware download the following file:

adnetwork33.redirectme.net///booswrap/main.php

It saves the file to %TEMP%setupGZ.tmp and runs it.

As of writing, the above URL is not accessible.

Additional information

Creates a mutex

We have seen this malware create the following mutexes:

GGM-KRTYUA1-B1NHHTYU B2B27EA7-6F32-4465-8C7C-D2A6E4BAEFA3

These mutexes can be an infection marker to prevent more than one copy of the threat running on your PC.

Analysis by Allan Sepillo

Last update 15 February 2019

 

TOP