English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Mediyes – the dropper with a valid signature

Vyacheslav Zakorzhevsky
Kaspersky Lab Expert
Posted March 15, 12:31  GMT
Tags: Malware Technologies, Verisign, Certificate authorities
0.5
 

Post was updated 19.03.2012 (see below)

In the last few days a malicious program has been discovered with a valid signature. The malware is a 32- or 64-bit dropper that is detected by Kaspersky Lab as Trojan-Dropper.Win32.Mediyes or Trojan-Dropper.Win64.Mediyes respectively.

Numerous dropper files have been identified that were signed on various dates between December 2011 and 7 March 2012. In all those cases a certificate was used that was issued for the Swiss company Conpavi AG. The company is known to work with Swiss government agencies such as municipalities and cantons.


Information about the Trojan-Dropper.Win32.Mediyes digital signature

We don’t yet know the exact source of Trojan-Dropper.Win32/Win64.Mediyes, but there’s reason to believe that it is installed on computers with the help of exploits.

The 32-bit dropper stores its own 32-bit driver – whose name begins with ‘HID’ – to the system drivers directory. The dropper then deletes itself from the system. The driver itself is not signed, though this doesn’t prevent it from functioning properly on a 32-bit Windows operating system. The driver contains a DLL which is copied to a system folder beginning with the letters ‘PNG’. The main function of the driver is to inject a DLL into an Internet browser process. The driver also conceals the Mediyes components on the disk.

The 64-bit dropper does not contain a driver and injects a DLL directly into the browser.

The malicious DLL is detected by Kaspersky Lab as Trojan.Win32.Mediyes, and the driver is detected as Rootkit.Win32.Mediyes.

After the DLL is launched, it checks which browser it is running in and then starts intercepting browser requests sent to the Google, Yahoo! and Bing search engines. It duplicates all requests on the server of the malicious users which is located in Germany. The search queries are used by the criminals to earn money as part of the Search 123 partner program that works on a pay-per-click (PPC) basis. The server responds to the users’ requests with links from the Search123 system that are clicked without the user knowing about it. This results in the bad guys making money from fake clicks.


Description of the Search123 partner program

According to KSN data, the malicious DLL Trojan.Win32.Mediyes was detected on the computers of approximately 5,000 unique users, primarily in Western Europe – Germany, Switzerland, Sweden, France and Italy.


Geographical distribution of Trojan.Win32.Mediyes

The malware is clearly aimed at users in Western Europe. This is backed up by other evidence – the certificate from a Swiss company, the server in Germany, and only the requests made on major international search engines being intercepted.

We have informed VeriSign about the threat and have asked them to revoke the compromised certificates.

UPD: Symantec revoked compromised certificates 15.03.2012.


1 comments

ProcessHunter

2013 Mar 30, 19:50
0
 

Unknown signed droppers found?

Please look at this - this are valid signed exe-files:

https://www.virustotal.com/de/file/7a895ac7e5070de46552142bf1d185 20e258795b130770afd4d0da65e370 c692/analysis/1364656403/

https://www.virustotal.com/de/file/5b847dcf9c2f548195c508e45d76fc 6bccfd9e5a1c685dccb09061960095 8155/analysis/1364656614/

https://www.virustotal.com/de/file/79f6a8b1b11013f2935f1c271fb676 2faed26fe874d9e86e457ede1c2395 ba7e/analysis/1364656559/

Reply    
If you would like to comment on this article you must first
login


Bookmark and Share
Share

Analysis

Blog