Lavasoft Security Bulletin: November 2012

Top20 Blocked Malware

Position Ad-Aware detection % of all threats Change in ranking
1 Trojan.Win32.Generic!BT 29.51% +8.96%
2 Win32.Trojan.Agent 21.32% -20.53%
3 Virus.Win32.Sality.at 3.36% +2.02%
4 Malware.JS.Generic 2.88% +0.69%
5 Trojan.Win32.Generic.pak!cobra 2.64% +0.41%
6 Email-Worm.Win32.Brontok.a 2.37% +1.17%
7 Virus.VBS.Ramnit.a 1.98% +1.51%
8 Trojan.Win32.Ramnit.c 1.92% +0.33%
9 Virus.Win32.Ramnit.b 1.39% +0.84%
10 Virus.Win32.Sality.ah 1.28% -0.36%
11 Virus.Win32.Xpaj.ab 1.27% new
12 Trojan.Win32.Jpgiframe 1.14% +0.59%
13 Virus.Win32.Virut.ce 1.12% +0.62%
14 Heur.HTML.MalIFrame 1.09% +0.14%
15 Worm.Win32.Сhir.b 1.07% new
16 Trojan.Win32.Generic!SB.0 1.01% +0.38%
17 Trojan-Downloader.Win32.VB.pqr 0.87% new
18 Trojan-Spy.Win32.Agent 0.84% new
19 Virus.Win32.Neshta.a 0.76% new
20 HackTool.Win32.Keygen 0.74% -0.06%

The Top 20 malicious programs blocked on PCs

November sees generic detections and viruses sharing the top positions, a new modification of the Xpaj virus mentioned earlier in Lavasoft Security Bulletin, such malicious programs as Worm.Win32.Сhir.b, Trojan-Downloader.Win32.VB.pqr and Virus.Win32.Neshta.a possessing destructive functionality as described in previous bulletins.

A new generic detection Trojan-Spy.Win32.Agent has entered the Top 20. Such malicious programs are designed to steal confidential information from compromised machines and include various user activity tracking systems, keyboard spies, network traffic analyzers, programs for capturing desktop screen shots and stealing clipboard data. An interesting peculiarity of the malware is the legal spread of some data through the Internet. Below are examples of Google trends for the following search requests: "keylogger download" and "ardamax keylogger download":

Google trends "keylogger download"

Google trends "ardamax keylogger download"

According to trends, monitoring software with potentially malicious functionality is of great interest amongst internet users.

New Incomings to the Lab

Let’s review and consider information on the number of unique files with the same detection name.

Position Ad-Aware detection % of all threats Change in ranking
1 Trojan.Win32.Generic!BT 69.37% +2.52%
2 Virus.Win32.Xpaj.ab 6.46% +5.08%
3 Trojan.Win32.Generic.pak!cobra 5.65% -1.07%
4 Malware.JS.Generic 4.05% -2.66%
5 Virus.Win32.Virut.ce 3.60% -1.43%
6 Trojan.Win32.Winwebsec.fd 1.70% -0.73%
7 Trojan.Win32.Vobfus.paa 1.49% +1.03
8 Worm.Win32.Mabezat.b 1.51% new
9 Trojan-Downloader.Win32.Harnig 0.78% -0.51%
10 Trojan.Win32.Medfos.r 0.76% -0.39%
11 Trojan.Win32.VB.qms 0.68% +0.11%
12 Virus.Win32.PatchLoad.d 0.63% -0.3%
13 Trojan.Win32.Ransom.jc 0.56% new
14 Trojan.JS.IFrame.i 0.53% new
15 Trojan.Win32.Ransomer.afh 0.48% -0.29%
16 Trojan.Win32.PWS.gz 0.47% new
17 Trojan-Downloader.Win32.Vundo.jd 0.46% new
18 Trojan-Clicker.HTML.RemoteScript 0.44% -0.16%
19 Trojan.Win32.VBInject.pcc 0.37% new
20 Worm.Win32.Esfury.ta 0.33% -0.23%

New malicious programs entered the Top 20

Except for Worm.Win32.Mabezat.b, a multifunctional worm, and Trojan.Win32.PSW.gz, a Trojan that targets account information for the game “Dungeon Fighter” and the Tencent QQ service to transmit instant messages, more new malicious families appear.

Trojan.Win32.Ransom.jc belongs to a malicious family that disrupts normal computer performance or blocks access to users’ confidential data. Attackers hold machines to ransom until users pay a fee to unlock their computers, although making the payment to an attacker guarantees nothing. Below is an example of the pop-up window which locks the computer, the multi locker "Nertra":

Nertra multi locker pop-up windows updated in November https://www.botnets.fr/index.php/Nertra

Trojan.JS.IFrame.i describes malicious JavaScript contained in an "iframe" tag on a compromised/booby-trapped website. As a rule, attackers plant the Trojan code on legitimate internet sites that redirect the user’s browser to servers hosting exploits that allow for the execution of random code on the target system.

Trojan-Downloader.Win32.Vundo.jd is a multifunctional Trojan downloader which disguises itself as "Symantec Shared Component Scanner Stub" using the file name: "Navmt.exe".

File info for Trojan-Downloader.Win32.Vundo.jd

The Trojan not only downloads other malicious programs to the compromised PC but blocks Internet access, increases website traffic, as well as injecting html into web pages a user visits.

Trojan.Win32.VBInject.pcc is written in Visual Basic. A specific feature of this malicious family is to inject malicious code into the address space of processes specified by an attacker. Among them can be system processes, as well as process run by the current Windows user. The technique is used by attackers to evade proactive security.

Persian Trojan

Last week Symantec published a report where they describe a new piece of malware, called “Narilam”, which appears to be localized to Iran. Several days later Kaspersky Lab revealed more information about the threat.

There is no evidence of any connection with infamous Stuxnet/Duqu/Flame/Gauss government Trojans. It is compiled with Borland C++ unlike the mentioned Trojans. Narilam provides a targeted attack against specific corporate databases with the following Persian names: alim, maliran and shahd, which coincide with corresponding products by TarrahSystem:


Maliran – Integrated Financial and Industrial Applications,
Amin – Banking and Loans Software,
Shahd (“Nectar”) – Integrated Financial / Commercial Software.



According to the SQL requests mined from the threat code, the Trojan can delete and modify data in database. The company warns visitors of the website about that threat.

The message inform users about a necessity to prepare a backup of financial information stored in database due to Narilam threat.
To launch itself every time the system starts up, the Trojan copies itself to the Startup folder:


C:\Documents and Settings\All Users\Start Menu\Programs\Startup\DATA.EXE


It can also propagate via standard CD/DVD burning folder. This propagation technique is not used so often nowadays:

Blackhole Exploit Kit Renewal

The beginning of November sees updates to the popular Black Hole Exploit Kit. A Java exploit (CVE-2012-5076) is added to the latest version, 2.0.1. To be executed, the Java exploit uses the vulnerability in Java Runtime Environment. In spite of the fact that the vulnerability was found at the end of September, infections caused by the exploit are still widespread in November. Microsoft presented a detailed analysis of the vulnerability in the blog. Malicious applets which exploit the vulnerability are not detected by the majority of antivirus software.

The exploit can evade the security model in Java VM and execute some privileged instructions.

Top20 Potentially Unwanted Programs

Below are the Top20 Potentially Unwanted Programs blocked by Ad-Aware on user’s PCs. These are advertising software, browser toolbars, search engines and other programs which change browser start pages and other system settings.

Position Ad-Aware detection % of all threats Change in ranking
1 MyWebSearch 32.75% +2.36%
2 SweetIM 13.76% +2.36%
3 Win32.Toolbar.Iminent 12.81% -2.94%
4 Win32.PUP.Bandoo 8.44% -1.91%
5 BPProtector 3.51% new
6 Babylon 3.17% new
7 Win32.Toolbar.SearchQU 2.26% -0.79%
8 Win32.Toolbar.Mediabar 1.58% -0.64%
9 GamePlayLabs 1.57% +0.42%
10 Click run software 1.52% +0.49%
11 Win32.Adware.Offerbox 1.42% +0.44%
12 Win32.Adware.ShopAtHome 1.34% -0.71%
13 Win32.PUP.Predictad 1.25% -0.92%
14 Yontoo 1.07% -0.04%
15 Artua Vladislav 1.01% +0.05%
16 Via Advertising 1.01% +0.16%
17 Wajam 0.93% new
18 RelevantKnowledge 0.85% -0.82%
19 InstallBrain 0.70% -0.03%
20 Adware.Eorezo.a 0.67% -0.16%

Top20 PUPs detected on user’s PC

Below are examples of PUPs collected by our laboratory:

Example 1. PUPs GamePlayLabs

Example 2. PUPs Artua Vladislav

Example 3. Click run software

Infections by OS

Geographic Location

Infections by country of origin

We will keep investigating the epidemiological situation in the world and informing our readers about new malicious code samples in the next Lavasoft Security Bulletin.

  • Back to articles


  • Share this post:    Twitter Facebook
    x

    Our best antivirus yet!

    Fresh new look. Faster scanning. Better protection.

    Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

    For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

    Download adaware antivirus 12
    No thanks, continue to lavasoft.com
    close x

    Discover the new adaware antivirus 12

    Our best antivirus yet

    Download Now