Trojan.Generic.KD.37749_a5cb66464a
Trojan.Generic.KD.37749 (BitDefender), Trojan:Win32/Alureon.CT (Microsoft), Trojan-Dropper.Win32.TDSS.gen (Kaspersky), Trojan.Win32.Alureon.h (v) (VIPRE), Trojan.MulDrop1.47206 (DrWeb), Trojan.Generic.KD.37749 (B) (Emsisoft), DNSChanger.as (McAfee), Trojan.Gen (Symantec), Trojan.Win32.Alureon (Ikarus), Trojan.Generic.KD.37749 (FSecure), Generic19.RXC (AVG), Win32:Trojan-gen (Avast), BKDR_TDSS.SMC (TrendMicro), Trojan.Generic.KD.37749 (AdAware), Tdl4.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: a5cb66464a9810c2d167254828974649
SHA1: f82bff372c45dd938946287ada310f3a71f329f9
SHA256: 517cd440d748fc29f77f466b0adc629981aa99fabd3676b8841a7599d8ee0198
SSDeep: 1536:5/koYAAyMznBWHXocQpDRl96FmIJ zQ1esxLRcmRBKMTDH6whI6QqD4IaV:C1PnBWHXocQpDfI0IJKIBRReMTDH3B6
Size: 100864 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: SetApp
Created at: 2010-09-16 14:20:10
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1084
The Trojan injects its code into the following process(es):
spoolsv.exe:1444
File activity
The process spoolsv.exe:1444 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\Temp\4.tmp (41472 bytes)
The Trojan deletes the following file(s):
%WinDir%\Temp\4.tmp (0 bytes)
The process %original file name%.exe:1084 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\2.tmp (100864 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp (8192 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\3.tmp (0 bytes)
Registry activity
The process spoolsv.exe:1444 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\System\CurrentControlSet\Services\mdritnxrpqfatfp]
"Type" = "1"
"ImagePath" = "\??\%WinDir%\TEMP\4.tmp"
[HKLM\System\CurrentControlSet\Control\Print\Providers]
"Order" = "LanMan Print Services, Internet Print Provider, tdl"
[HKLM\System\CurrentControlSet\Control\Print\Providers\tdl]
"Name" = "C:\DOCUME~1\test\LOCALS~1\Temp\3.tmp"
The Trojan deletes the following registry key(s):
[HKLM\System\CurrentControlSet\Services\mdritnxrpqfatfp\Enum]
[HKLM\System\CurrentControlSet\Control\Print\Providers\tdl]
[HKLM\System\CurrentControlSet\Services\mdritnxrpqfatfp]
The process %original file name%.exe:1084 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A5 62 C5 60 48 31 D1 E7 5B 32 B7 0D 65 75 D9 BB"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\C:\DOCUME~1\test\LOCALS~1\Temp\5.tmp,"
Network activity (URLs)
No activity has been detected.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
Using the driver "UNKNOWN" the Trojan controls loading executable images into a memory by installing the Load image notifier.
Using the driver ROOTKITPATH the Trojan intercepts DriverStartIO in a miniport driver of a hard drive controller (ATAPI) to handle request to its own files:
StartIo
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 10829 | 11264 | 4.51611 | 4ce79431f30e88f3dbb387b16c5139c1 |
| .tls | 16384 | 512 | 512 | 0.352222 | 58ad8b28b91aed0449b4806a462296c5 |
| KDATA | 20480 | 836 | 1024 | 2.44624 | aa1139c7cf5e3cf644aa2edb22ee77d8 |
| IMPORTS | 24576 | 2864 | 3072 | 3.28437 | c528b16db44315bd2dfb3bb101e791c7 |
| .rsrc | 28672 | 82540 | 82944 | 5.37431 | 3b932cdc8f3eb52edc733593a316a90a |
| .reloc | 114688 | 768 | 1024 | 2.3611 | bfaf27e1295ddc20c95023c9cc99ca93 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1084
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%WinDir%\Temp\4.tmp (41472 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\2.tmp (100864 bytes) - Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.