|Detected||Sep 25 2006 14:22 GMT|
|Released||Oct 24 2006 12:34 GMT|
|Published||Sep 25 2006 14:22 GMT|
This Trojan downloads files via the Internet without the user’s knowledge or consent. It is a Windows PE EXE file. The file is 3,072 bytes in size. It is written in Assembler.
Once launched, the Trojan registers itself in the system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run] "WinMedia" = "name_Trojan_file"
This ensures that the Trojan will be launched each time Windows is booted on the victim machine.
The Trojan also creates a unique identifier, “0b.bot” to flag its presence in the system.
The Trojan waits for the victim machine to connect to the Internet. It then connects to 245.47.***.216 on port 2514. (The port and the server address may differ according to the variant of the Trojan. The Trojan receives other malicious code from the server.
It then launches “%system%\servises.exe", injects the malicious code got from the server into the process, and passes control to it.
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.