|Detected||Sep 17 2006 23:16 GMT|
|Released||Sep 17 2006 23:16 GMT|
|Published||Apr 12 2007 12:17 GMT|
This Trojan downloads other programs via the Internet and launches them for execution on the victim machine without the user’s knowledge or consent. The Trojan is a Windows PE EXE file. The file is approximately 9KB in size. It is packed using PECompact. The unpacked file is approximately 22KB in size.
When launched, the Trojan copies its executable file to the Windows system directory:
The Trojan also extracts the following file from its body:
In order to ensure that the Trojan is launched automatically each time Windows is restarted, the Trojan registers its executable file in the system registry:
The original Trojan executable file is then deleted.
The Trojan creates the following system registry key parameters:
%System%\z<random_number>z.dll loads itself to all active processes in the system, and will delete itself instantly if the name of the process is not iexplore.exe.
Once loaded into iexplore.exe, the Trojan component will:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion] irf = http://amsterdam.9966.org/**/loads/
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion] xfv = http://www.original-ie-cards.com/loads/**/svchost.exe
The file will then be launched for execution.
(At the moment of writing, this link was not working.)
The Trojan also creates the following registry key parameter, and save its configuration to this key:
The Trojan scans the system for windows with the following titles:
Warning: Components Have Changed Warning: some components changed Hidden Process Requests Network Access Allow all activities for this application
It will simulate a mouse click on "OK" or "Unblock" in these windows.
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
%System%\q<random_number>q.exe %System%\z<random_number>z.dll %System%\a<random_number>a.exe
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion] xfv irf 38fh
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.