Lavasoft Security Bulletin: July 2013
Top20 Blocked Malware
Position | Ad-Aware detection | % of all threats | Change in ranking |
1 | Win32.Trojan.Agent | 29.91% | -3.30% |
2 | Trojan.Win32.Generic!BT | 24.50% | -2.39% |
3 | Backdoor.Win32.VB.lvn | 10.20% | new |
4 | INF.Autorun | 2.96% | +2.18% |
5 | Virus.Win32.Sality.at | 2.65% | -0.58% |
6 | Win32.Backdoor.Inject/C | 2.50% | new |
7 | Worm.Win32.Taterf.b | 2.12% | new |
8 | Trojan.Win32.Generic.pak!cobra | 2.11% | -1.63% |
9 | Malware.JS.Generic | 1.99% | -0.76% |
10 | Trojan-Dropper.Win32.Agent | 1.81% | new |
11 | Virus.Win32.Sality.ek | 1.63% | new |
12 | Virus.Win32.Neshta.a | 1.20% | +0.51% |
13 | HackTool.Win32.Keygen | 1.10% | -0.52% |
14 | Virus.Win32.Ramnit.b | 1.06% | +0.03% |
15 | Virus.Win32.Virut.ce | 0.90% | +0.17% |
16 | Virus.VBS.Ramnit.a | 0.90% | -0.19% |
17 | Virus.Win32.Sality.ah | 0.87% | +0.18% |
18 | Trojan.Win32.Generic!SB.0 | 0.43% | new |
19 | Trojan.Win32.Jpgiframe | 0.34% | -0.49% |
20 | Heur.HTML.MalIFrame | 0.32% | -0.25% |
The Top 20 malicious programs blocked on PCs
July sees a new leader in the Top 20, Backdoor.Win32.VB.lvn detection, written in Visual Basic. The malware provides an attacker with access to the compromised system.
A detection for autorun.inf, INF.Autorun, takes the forth position. The file is used by worms to spread. In July, Ad-Aware detected and disinfected an increased number of these infections.
New apperances include Trojan.Win32.Generic!SB.0 and a modification of Sality, Virus.Win32.Sality.ek, previously examined in the first Lavasoft whitepaper published in March 2012.
Win32.Backdoor.Inject, discussed previously in a Lavasoft whitepaper published in January 2013, is a generic detection for malicious programs which inject malicious code into running processes. The injected code is used by attackers to get access to the compromised system.
Worm.Win32.Taterf.b is a worm spread through all logical, network and removable drives and is capable of disabling antivirus services. Its main payload is stealing online game users’ data, for games such as Age of Conan, Online Pool, Chain of Command and Knight Online.
During the summer, online game users are frequently the target for malware authors. This can be explained by the fact that vacation time sees an increase in online gaming activity.
Trojan-Dropper.Win32.Agent is a detection for Trojan programs which install other malicious programs as well as potentially unwanted software on the system.
New Incomings to the Lab
Let’s review and consider information on the number of unique files with the same detection name.
Position | Ad-Aware detection | % of all threats | Change in ranking |
1 | Trojan.Win32.Generic!BT | 36.22% | +0.48% |
2 | Trojan.Win32.Generic.pak!cobra | 4.58% | +2.27% |
3 | Virus.Win32.Expiro.bc | 3.18% | -0.72% |
4 | Trojan-Downloader.Win32.LoadMoney.s | 2.71% | new |
5 | Trojan.Win32.Generic!SB.0 | 1.06% | -0.54% |
6 | Trojan.Win32.PSW.gz | 0.98% | -0.24% |
7 | Trojan-Dropper.Win32.Gepys.a | 0.81% | new |
8 | Virus.Win32.Virut.ce | 0.77% | -1.64% |
9 | Trojan.JS.Obfuscator.aa | 0.59% | -0.11% |
10 | Win32.Malware!Drop | 0.48% | +0.15% |
11 | Trojan.Win32.Vobfus.paa | 0.42% | +0.07% |
12 | Worm.Win32.Pykspa | 0.40% | new |
13 | FraudTool.Win32.FakeRean | 0.39% | +0.05% |
14 | Worm.Win32.Gamarue.aa | 0.38% | +0.03% |
15 | Trojan.Win32.Autorun.dm | 0.32% | new |
16 | Trojan.Win32.Qhosts.bf | 0.31% | -0.04% |
17 | Malware.JS.Generic | 0.31% | -0.04% |
18 | TrojanPWS.Win32.OnLineGames.ahj | 0.30% | -0.05% |
19 | Trojan.Win32.Dwnldr.y | 0.28% | -0.08% |
20 | Worm.Win32.Mabezat.b | 0.27% | -0.69% |
New malicious programs entered the Top 20
July sees four new detections in the Top 20. Worm.Win32.Pykspa, discussed previously in a Lavasoft whitepaper published in April 2013; Trojan.Win32.Autorun.dm, which entered the Top 20 for the first time in August 2012 is designed to automatically run malicious programs; Trojan-Downloader.Win32.LoadMoney and Trojan-Dropper.Win32.Gepys.a.
Trojan-Downloader.Win32.LoadMoney.s is a Trojan program which installs other malicious programs on the compromised system without user’s knowledge. Mail.ru previously used a downloader that installed the Mail.ru.Guard and Mail.ru.Sputnik utilities without user’s knowledge. Some antivirus vendors detected this malicious program as "not-a-virus LoadMoney". We categorise such programs as “Trojan” because it is unacceptable for legal software to install a program without user’s knowledge.
Trojan-Dropper.Win32.Gepys.a is a Trojan that installs other malicious programs on the system. As a rule, it is a dynamic link library (DLL) saved in the "All Users" profile to the %AppData%\Mozilla folder under a randomly generated name. The automatic launch of a DLL at each running process is caused by changes to the "AppInit_DLLs" system registry key:
[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows]
Fake antiviruses holding machines to ransom until a fee is paid to unlock their computers continue to blight users. In July, our systems detected the following fake antiviruses:
Fake AV (MD5: 5a88b972fcf39d2f5b0fb941b76f54c6) is detected by Ad-Aware as Trojan.Win32.FakeAV.IS
Fake AV (MD5: 7b8763eb682cef61090c7eeb3f6e408d) is detected by Ad-Aware as Trojan.Win32.Jorik.Fraud.un
Fake AV (MD5: 51f39bed9b38cd74ce3020e9e7b9730f) is detected by Ad-Aware as Trojan.Win32.FakeAv.awrp
Undocumented FPU instructions
In June, Microsoft published the results of its investigation into a new undocumented instruction trick AlienVault Labs subsequently published "Hunting for malware with undocumented instructions". The following malware samples use FPU instructions that lead to incorrect disassembly in several debuggers and disassemblers: Backdoor:Win32/Farfli.AV, Trojan:Win32/Danglo, Backdoor:Win32/Zegost.B were detected.
Based on a Yara rule from AlienVault Labs, in July, we added the following Yara rule to Lavasoft MAS:
rule undocumentedFPUinstructions
{
strings:
$a1 = {D9 D8}
$a2 = {DF DF}
condition:
($a1 in (entrypoint..entrypoint+12)) or ($a2 in (entrypoint..entrypoint+12)) or (for any of ($a*) : ($ at entrypoint))
}
Our automated analysis systems detected the following samples:
MD5: 0f66f960852d1c9fb184e4813143aa90, detected by Ad-Awar as Trojan.Win32.Bdoor.bdk, detected by Microsoft as Backdoor:Win32/Zegost.AD
MD5: 5eb3a32051320dc1b3caa6e554a54ffb, detected by Ad-Aware us Trojan.Win32.Generic!BT, detected by Microsoft asBackdoor:Win32/Racdr.A
MD5: 011d1e05bb63314922936d02b63a7a93, detected by Ad-Aware us Trojan.Win32.Generic!BT, detected by Microsoft as DDoS:Win32/Nitol.A
MD5: cf9ee9be74908e1c8c3b2ee607812743, detected by Ad-Aware us Trojan.Win32.Generic!BT, detected by Microsoft as Backdoor:Win32/Babmote.A
MD5: e2bdc9e611a6cbe3f637165dcd14990c, detected by Ad-Aware us Trojan.Win32.Redosdru.C, detected by Microsoft as Backdoor:Win32/Babmote.A
All files, apart from DDoS:Win32/Nitol.A were not packed. DDoS:Win32/Nitol.A was packed by RLPack. Attackers might use special means to add those instructions to the executable files after compiling and packing. We tried to reproduce attackers’ actions experimenting with a legitimate file, notepad.exe, by modifying an entry point:
MD5: 394f5fd5696cca3648a53a179da66059
Afterwards, the file was uploaded to virustotal.com:
Two antivirus vendors added detection of undocumented instructions even in white files. The trick can be used by attackers to counteract emulators of antivirus companies.
Tandem-type IRC Bots
In July, an interesting infection incident was detected by our automated malware analysis system, Lavasoft MAS. Three IRC bots were simultaneously detected on the compromised system: Nrbot, Blazebot and Rbot.
Two C&C servers were detected from which commands can be received by Nrgbot (channel #nrz#), Rbot(channel #fkyou# ) and Blazebot (channel ##TBT). The auto-join channel "#Security-Check" for all bots:
178.33.232.15
146.82.5.222
By using Internet Relay Chat client mIRC and connecting to C&C servers, it is possible to track the current commands bots receive. When the description was created, the same commands were received from two servers:
Attackers again show an interest in Bitcoin. With malicious programs such as Skyper attackers can install a bitcoin generator on compromised computers. For this time, attackers went on and organize a tandem with IRC bots.
Top20 Potentially Unwanted Programs
Below are the Top20 Potentially Unwanted Programs blocked by Ad-Aware on user’s PCs. These are advertising software, browser toolbars, search engines and other programs which change browser start pages and other system settings.
Position | Ad-Aware detection | % of all threats | Change in ranking |
1 | MyWebSearch | 26.24% | +6.12% |
2 | Adware.Linkury | 14.95% | -4.84% |
3 | Win32.Toolbar.Iminent | 8.43% | -2.15% |
4 | Win32.PUP.Bandoo | 7.84% | +1.29% |
5 | SweetIM | 4.56% | -1.87% |
6 | Iminent | 4.51% | -6.07% |
7 | Bprotector | 3.18% | -0.93% |
8 | InstallCore | 2.26% | -0.02% |
9 | Yontoo | 2.17% | -0.98% |
10 | Babylon | 1.70% | -0.13% |
11 | Artua Vladislav | 1.35% | -0.19% |
12 | InstallBrain | 1.34% | -0.01% |
13 | Win32.Adware.ShopAtHome | 1.29% | +0.40% |
14 | Wajam | 1.27% | -0.01% |
15 | DownloadMR | 1.22% | +0.07% |
16 | CoolMirage Ltd | 1.05% | -0.01% |
17 | DomaIQ | 1.00% | -1.18% |
18 | Optimum Installer | 0.88% | +0.07% |
19 | Win32.Toolbar.Mediabar | 0.78% | -0.03% |
20 | GamePlayLabs | 0.75% | -0.38% |
Top20 PUPs detected on user’s PC
Operating Systems
Infections by OS
Geographic Location
Infections by country of origin
We will keep investigating the epidemiological situation in the world and informing our readers about new malicious code samples in the next Lavasoft Security Bulletin.
Share this post:

