|Detected||Apr 22 2010 07:47 GMT|
|Released||Apr 22 2010 16:17 GMT|
|Published||May 19 2010 12:21 GMT|
This Trojan downloads other malicious programs from the Internet and launches them for execution without the user's knowledge. It is a Windows dynamic library (PE EXE file). It is 53 248 bytes in size. It is written in C++.
The Trojan is distributed as a set of free programs from Google called "Google Installer".
To ensure that its process is unique within the system, the Trojan creates a unique identifier:
s9a8mzjXWUUPFN6iThe Trojan also creates the following registry key:
[HKCU\Software\Google\Google Updater] "GUID" = "<rnd>" "value" = "4.023"where <rnd> is a randomly generated unique identifier, for example "b7acd35b-4587-4f37-8b5f-925f03667e9d".
Every 5 seconds the Trojan sends an HTTP request to one of the malicious user's servers:
http://server-<rnd>.apartmsk.ru http://server-<rnd>.ruporno.tvThe request looks like this:
GET /stat?uptime=100&downlink=1111&uplink=1111&id="<rnd2> "&statpass=bpass&version=5&guid= <rnd3>&comment=4.023 HTTP/1.0<rnd2> is a random sequence of digits in hexadecimal notation, for example "002F88D2"
<rnd3> consists of the values of the "GUID" parameter of the above-mentioned system registry key.
At the time of writing, the servers were inactive.
In response, a link is received from the server for subsequently downloading a file.
The downloaded file is saved in the current user's Windows temporary directory under a randomly generated name, after which it is launched for execution.
If your computer does not have an antivirus, and is infected by this malicious program, follow the instructions below to delete it:
[HKCU\Software\Google\Google Updater] "GUID" = "<rnd>" "value" = "4.023"
%Temporary Internet Files%
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.