My Bitdefender
  • 0 Shopping Cart

SHARE
THIS ON

Facebook Twitter Google Plus

Trojan.Downloader.Bredolab.AM

MEDIUM
MEDIUM
~64 kbytes
(Win32/PSW.YahooPass.AF trojan; Trojan-Downloader:W32/Bredolab.IH; PWS:win32/YahooPass.H; TSPY_HOOYPASS.AF)

Symptoms

- presence of a .dll having a nine letter random name in %SYSTEM32% folder

Removal instructions:

Please let BitDefender disinfect your files.

Analyzed By

Dana Stanut, virus researcher

Technical Description:

     This malware has a word document icon in oder to lure the user into opening it.
     When executed it will drop a .dll file in %SYSTEM32% folder with a random name (e.g:for the analyzed sample, the .dll name was frjacnwrm.dll) and registers it as a BHO by adding / modifying the following registry keys:

HKLM\SOFTWARE\Classes\CLSID\
(Default) -> Microsoft Online Helper!

HKLM\SOFTWARE\Classes\CLSID\\InProcServer32
(Default) -> %SYSTEM32%\frjacnwrm.dll

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
(Default) -> Microsoft Online Helper!

     Next it will change Internet Explorer's settings by altering the next registry key:
HKCU\Software\Microsoft\Internet Explorer\Main
@#$E$@#n%^a&^%b#$%l^%$e^& %^&B#$%r&^%o$%w@#$s^%$e&*r(*& &*E*^&x$^%t%$#e@#$n&^%s#%i*^o$%^n(&*s%^& -> yes
(Enable Browser Extensions -> yes)

     Then it wil drop a file named sys.bat that will be used to delete itself.

     The dropped .dll will be used to monitor user's activity and the gathered data will be sent via http post to the following address: http://[removed]idbredov.ru