Analysis by: Rika Joi Gregorio

 ALIASES:

Trojan-Ransom.Win32.PornoAsset.ckkk(Kaspersky), TrojanDropper:Win32/Rovnix.L(Microsoft), Trojan.Cidox.C(Symantec), PWSZbot-FRG!56DB6A59AEBB(McAfee), Trojan-PWS.Win32.Fareit(Ikarus), a variant of Win32/Kryptik.BRHX trojan(Eset)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

Canal de infecção: Downloaded from the Internet, Dropped by other malware

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It restarts the affected system.

  TECHNICAL DETAILS

Tipo de compactação: 280,576 bytes
Tipo de arquivo: EXE
Residente na memória: Yes
Data de recebimento das amostras iniciais: 04 Sep 2014
Carga útil: Steals information

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan drops the following files:

  • %System%\{random file name}

(Note: %System% is the Windows system folder, which is usually C:\Windows\System32.)

It drops and executes the following files:

  • {malware path}\{random 8 characters}.bat - used to delete itself

Other Details

This Trojan checks for the presence of the following process(es):

  • vmusrvc.exe
  • vpcmap.exe
  • vmsrvc.exe
  • vboxservice.exe
  • vboxtray.exe
  • ollydbg.exe
  • windbg.exe
  • idag.exe
  • idag64.exe
  • pexplorer.exe
  • lordpe.exe
  • hiew32.exe
  • bindiff.exe
  • wireshark.exe

It restarts the affected system.

NOTES:

It modifies the NTFS boot sector to load its encrypted code.

It also hooks the following APIs:

  • NtQueryDirectoryFile
  • NtClose
  • NtOpenFile
  • NtQueryInformationFile
  • NtSetInformationFile
  • NtCreateFile
  • NtDeleteFile
  • NtShutdownSystem
  • NtOpenKey
  • NtEnumerateKey
  • NtCreateKey

This malware log keys, Ammyy Admin IDs, and passwords.

  SOLUTION

Mecanismo de varredura mínima: 9.700
Primeiro arquivo padrão VSAPI: 11.128.05
Data do lançamento do primeiro padrão VSAPI: 05 Sep 2014
VSAPI OPR Pattern Version: 11.129.00
VSAPI OPR Pattern veröffentlicht am: 05 Sep 2014

NOTES:

For Trend Micro product users, use the ATTK with ATRT to restore the modified Initial Program Loader (IPL) of an active NTFS partition.


Did this description help? Tell us how we did.