My Bitdefender
  • 0 Shopping Cart

SHARE
THIS ON

Facebook Twitter Google Plus

Trojan.Injector.CH

HIGH
MEDIUM
approx 32700 bytes

Symptoms

Increased network activity.

Removal instructions:

Please let BitDefender disinfect your files.

Analyzed By

Stefan Catalin Hanu, virus researcher

Technical Description:

After execution, the malware copies itself to
    C:\Program Files\Microsoft Common\wuauclt.exe
and connects to a remote server (91.203.[hide].[hide]:http). If needed, it will add an exception
to the Windows firewall. It injects code in the memory instance of svchost and sends sensitive information
about the infected computer ( such as the version of the operating system and the port
on which the virus can receive data ) and waits to receive a command. Based on
the operating system of the infected computer, the virus tries to download a
file from a certain address, that acts as an update. On the test machine, the file was %SYSTEM%\cpl32ver.exe.
The file can be found in the process list and could have 1 or 2 svchost child processes.

The malware has its own smtp server which tries to connect to the following addresses and send e-mails
    mxs.mail.ru
    fk-in-f114.google.com
    gsmtp183.google.com
    smtp.messagingengine.com

It also connects to the folowing addresses:
    http://[hide]xu.ru/load3/ld.php?[info]
    http://[hide]xr.ru/loadx/ld.php?[info]
    211.95.[hide].[hide]:http
    208.66.[hide].[hide]:http
    216.195.[hide].[hide]:5634

It drops the rootkit component ( %SYSTEM%\drivers\[random].sys ) that hooks to the System Service Descriptor Table.
This way, the virus manages to hide the registry keys it creates.

For the process to start in safe mode, it creates the following registry keys:
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\[random].sys
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\[random].sys

So that the application can start with the operating system the folowing keys are added:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cpl32ver ( on the test machine )
HKLM\System\CurrentControlSet\Services\[random]
HKLM\System\CurrentControlSet\Services\tcpsr
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe