A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #3295  by EP_X0FF
 Wed Nov 03, 2010 12:35 pm
Trojan downloader with blacklist and Vm detection on board.

http://www.virustotal.com/file-scan/rep ... 1288786972

Drops itself to %systemroot%\system32\config as svchost.exe

Set itself to autorun as service - Windows Service Manager.

Creates special mutex svchost32_2

While installation executes STOP and DISABLE commands for ALG service (Application-level gateway) and Windows Firewall service.

Malware contains security software blacklist.
klpf FSDFWD UmxCfg Detector de OfficeScanNT klpid F-Secure Filter kmxfile F-Secure HIPS kmxids FSFW UmxAgent ISWKL fsbts F-Secure Recognizer Panda Antivirus
lnsfw1 McAfee Framework Service kmxsbx sharedaccess OutpostFirewall kmxfw kmxcfg FSMA kmxagent FSORSPClient sfilter WinDefend klif kmxbig Norton Antivirus Service
vsdatant kl1 F-Secure Gatekeeper Handler Starter BFE IswSvc vsmon ZoneAlarm UmxPol kmxndis SmcService MpsSvc UmxLU F-Secure Gatekeeper Kaspersky Anti-Hacker.lnk
ZoneAlarm Client ISW Zone Labs Client AMonitor Look 'n' Stop
Bot trying to establish connection with
hxxp://adpool-3.net/cgi-bin/npr/web/t_vtc.cgi
d45parog.net/cgi/no.cgi
Drops configuration file
%systemroot%\system32\config\svchost.jxe
[M]
S1=e54q`snf/odu.bfh.on/bfh
S2=e54q`snf/odu.bfh.on/bfh
S3=e54q`snf/odu.bfh.on/bfh
[C]
Version=36060186
Looks like contains hardcoded VmWare detection (sample wasn't tried on VmWare)
vmware svga cntxcorp vmware pointing
Attachments
pass: malware
(29.64 KiB) Downloaded 57 times