Shiz_b19171daa6

by malwarelabrobot on October 16th, 2013 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Generic!SB.0 (VIPRE), Win32.SuspectCrc!IK (Emsisoft), Backdoor.Win32.Shiz.FD, Shiz.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Summary
Technical Details
Removal Recommendations

MD5: b19171daa6f4602db826c9c4bd9d2fe5
SHA1: d254c17c02ae51ac02ce2ff286bad9667593ca54
SHA256: 8018e517bebbe285b9733d5f5f7e0ad92771d58ddc69e27d8b3e005fa8a9bf04
SSDeep: 6144:7CJJfPjU62d rvBQ3QYlaBOkIoaz3UelJMg15r2b:42WiV5qOEIGS5k
Size: 259264 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: no certificate found
Created at: 2004-12-05 00:04:27


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

No specific payload has been found.

Process activity

The Trojan creates the following process(es):

b19171daa6f4602db826c9c4bd9d2fe5.exe:2612

The Trojan injects its code into the following process(es):

ctfmon.exe:252

File activity

The process b19171daa6f4602db826c9c4bd9d2fe5.exe:2612 makes changes in a file system.
The Trojan creates and/or writes to the following file(s):

%WinDir%\AppPatch\ilrdhtg.exe (1799 bytes)
%System%\config\software (3028 bytes)
%System%\config\software.LOG (5300 bytes)

The Trojan deletes the following file(s):

%Documents and Settings%\%current user%\Local Settings\Temp\1.tmp (0 bytes)

Registry activity

The process b19171daa6f4602db826c9c4bd9d2fe5.exe:2612 makes changes in a system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "E6 4A 8F D8 6D F1 13 7B 75 5F 28 75 D1 A0 32 C4"

[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%WinDir%\apppatch\ilrdhtg.exe_, \??\%WinDir%\apppatch\ilrdhtg.exe"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"d8cc41db" = "CêkæÚ`Ã¥D 5õÔPÃ¥EK ao.)Üà”¸a4d‚\yìqA}(Äé¼ü4|Âá@”°™,¡¤üHrѼ©€©”´D0}éiXª¸|Èy4¡RYÑúièmÑ©È„IáØð ±¼(¤ ádIÚبìdËœ XYâÀeÅ“iü¥AÅ¡Ii¸rÂ¥(¡A\y 9€éñ$ZÔa xÙ9

The process ctfmon.exe:252 makes changes in a system registry.
The Trojan creates and/or sets the following values in system registry:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"

Network activity (URLs)

URL IP
hxxp://cihunemyror.eu/login.php 50.116.56.144
hxxp://kefuwidijyp.eu/login.php (ET CNC Zeus/Spyeye/Palevo Tracker Reported CnC Server (group 3) , Malicious) 173.230.133.99
hxxp://galokusemus.eu/login.php 50.116.32.177
hxxp://jewuqyjywyv.eu/login.php (ET TROJAN Known Sinkhole Response Header , Malicious) 166.78.144.80
hxxp://digivehusyd.eu/login.php 96.43.141.186
jefapexytar.eu 50.116.56.144
fokyxazolar.eu 50.116.56.144
xuqohyxeqak.eu 50.116.56.144
lyruxyxaxaw.eu 50.116.56.144
gadufiwabim.eu 50.116.56.144
www.bing.com 204.79.197.200
foxivusozuc.eu 50.116.56.144
ryqecolijet.eu 50.116.56.144
gahihezenal.eu Unresolvable
puregivytoh.eu Unresolvable
nofyjikoxex.eu Unresolvable
tuwikypabud.eu Unresolvable
qegytuvufoq.eu Unresolvable
kepymexihak.eu Unresolvable
vojacikigep.eu Unresolvable
makagucyraj.eu Unresolvable
xuxusujenes.eu Unresolvable
tucyguqaciq.eu Unresolvable
lymylorozig.eu Unresolvable
jepororyrih.eu Unresolvable
xubifaremin.eu Unresolvable
nozoxucavaq.eu Unresolvable
dimutobihom.eu Unresolvable
voniqofolyt.eu Unresolvable
puvopalywet.eu Unresolvable
ciliqikytec.eu Unresolvable
tunujolavez.eu Unresolvable
xutekidywyp.eu Unresolvable
dikoniwudim.eu Unresolvable
fogeliwokih.eu Unresolvable
dixemazufel.eu Unresolvable
divywysigud.eu Unresolvable
lyvejujolec.eu Unresolvable
puzutuqeqij.eu Unresolvable
fobonobaxog.eu Unresolvable
qederepuduf.eu Unresolvable
rydinivoloh.eu Unresolvable
kemocujufys.eu Unresolvable
lysovidacyx.eu Unresolvable
nojuletacuf.eu Unresolvable
qeqinuqypoq.eu Unresolvable
magofetequb.eu Unresolvable
tupazivenom.eu Unresolvable
marytymenok.eu Unresolvable
rynazuqihoj.eu Unresolvable
jejedudupuc.eu Unresolvable
rytuvepokuv.eu Unresolvable
volebatijub.eu Unresolvable
ciqydofudyx.eu Unresolvable
vofozymufok.eu Unresolvable
cinepycusaw.eu Unresolvable
keraborigin.eu Unresolvable
qetoqolusex.eu Unresolvable
pumadypyruv.eu Unresolvable
nopegymozow.eu Unresolvable
masisokemep.eu Unresolvable
gatedyhavyd.eu Unresolvable
fodakyhijyv.eu Unresolvable
cicaratupig.eu Unresolvable
vocumucokaj.eu Unresolvable


Rootkit activity

The Trojan installs the following user-mode hooks in CRYPT32.dll:

CertVerifyCertificateChainPolicy

The Trojan installs the following user-mode hooks in WININET.dll:

HttpSendRequestExW
HttpSendRequestExA
InternetReadFileExA
InternetReadFileExW
HttpSendRequestA
HttpSendRequestW
InternetQueryDataAvailable
InternetCloseHandle
InternetReadFile

The Trojan installs the following user-mode hooks in USER32.dll:

GetWindowTextA
GetClipboardData
SendInput
GetMessageA
GetMessageW
TranslateMessage

The Trojan installs the following user-mode hooks in ADVAPI32.dll:

CryptEncrypt

The Trojan installs the following user-mode hooks in WS2_32.dll:

WSASend
recv
gethostbyname
WSARecv
send

The Trojan installs the following user-mode hooks in kernel32.dll:

CreateFileW

Propagation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Scan a system with an anti-rootkit tool.
  2. Terminate malicious process(es) (How to End a Process With the Task Manager):

    b19171daa6f4602db826c9c4bd9d2fe5.exe:2612

  3. Delete the original Trojan file.
  4. Delete or disinfect the following files created/modified by the Trojan:

    %WinDir%\AppPatch\ilrdhtg.exe (1799 bytes)
    %System%\config\software (3028 bytes)
    %System%\config\software.LOG (5300 bytes)

  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.