sobota 25. února 2012

TrojanSpy:Win32/Ranbyus.G


Encyclopedia entry
Updated: May 11, 2011  |  Published: May 11, 2011

Aliases
  • Trojan-Spy.Win32.Zbot.bipv (Kaspersky)

Alert Level (?)
Severe

Antimalware protection details
Microsoft recommends that you download the latest definitions to get protected.
Detection last updated:
Definition: 1.121.359.0
Released: Feb 24, 2012
Detection initially created:
Definition: 1.103.1297.0
Released: May 09, 2011


 

Summary

TrojanSpy:Win32/Ranbyus.G is a trojan that collects sensitive information for an attacker.


 

Symptoms

System changes
The following system changes may indicate the presence of this malware:
  • The presence of the following files:
  • <system folder>\dllhosl.exe 

  • The presence of the following registry modifications:
  • Adds value: "System Rescue"
    With data: "c:\windows\system32\dllhosl.exe"
    To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run



 

Technical Information (Analysis)

TrojanSpy:Win32/Ranbyus.G is a trojan that collects sensitive information for an attacker.
Installation
When executed, TrojanSpy:Win32/Ranbyus.G copies itself to <system folder>\dllhosl.exe.

Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.

The malware modifies the following registry entries to ensure that its copy executes at each Windows start:
Adds value: "System Rescue"
With data: "c:\windows\system32\dllhosl.exe"
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run

The malware utilizes code injection in order to hinder detection and removal. When TrojanSpy:Win32/Ranbyus.G executes, it may inject code into running processes, including the following, for example:
  • svchost.exe
Payload
Contacts remote host
TrojanSpy:Win32/Ranbyus.G may contact a remote host at buhgalter1.in using port 80. Commonly, malware may contact a remote host for the following purposes:
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1944208571c73f7140735dba422e67fa1b917ec38.

Žádné komentáře:

Okomentovat

Poznámka: Komentáře mohou přidávat pouze členové tohoto blogu.