ALS_BURSTED

 Analysis by: Dianne Lagrimas

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


This description is based is a compiled analysis of several variants of ALS_BURSTED. Note that specific data such as file names and registry values may vary for each variant.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

LSP

Initial Samples Received Date:

30 Jun 2011

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

NOTES:

This malware arrives in the system as an AutoLISP script bundled with a .DWG drawing file. Once the drawing file is opened, AutoCAD then loads and executes this malware.

It first searches for the file BASE.DCL and looks for ACADDOC.LSP in the same folder where BASE.DCL is located. It also searches for the file ACADDOC.LSP from where the current drawing file is saved. If found, it copies the content of the file ACADDOC.LSP to the file ACADDOC.LSP in the folder where BASE.DCL is located.

This malware disables some editing functionalities of AutoCAD.

This description is based is a compiled analysis of several variants of ALS_BURSTED. Note that specific data such as file names and registry values may vary for each variant.

  SOLUTION

Minimum Scan Engine:

9.200

Trend customers:

    Keep your pattern and scan engine files updated. Trend Micro antivirus software can clean or remove most types of computer threats. Malware, though, such as Trojans, scripts, overwriting viruses and joke programs which are identified as uncleanable, should simply be deleted.

All Internet users:

    1. Use HouseCall - the Trend Micro online threat scanner to check for malware that may already be on your PC.
    2. Catch malware/grayware before they affect your PC or network. Secure your Web world with Trend Micro products that offer the best anti-threat and content security solutions for home users, corporate users, and ISPs. Go here for more information on Trend Micro products that fit your needs.


Did this description help? Tell us how we did.