|Detected||Feb 20 2011 09:36 GMT|
|Released||Feb 22 2011 08:34 GMT|
|Published||Mar 16 2011 07:20 GMT|
This Trojan downloads another program to the computer and launches it for execution without the user's knowledge. It is a Windows application (PE EXE file) and is 56 320 bytes in size. It is packed using an unknown packer and is written in C++.
After launching, the Trojan checks the name of its original file. If the name of the malware's executable file does not contain the string "sdcml.exe", it copies its executable file to the current user's temporary files directory under the name:
%Temp%\<rnd>\<rnd2>sdcml.exewhere rnd and rnd2 are random sequences of letters. It then launches a copy of its file for execution. In order to ensure that it is launched automatically each time the system is restarted, the Trojan adds a link to its executable file in the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run] "<rnd3>"="%Temp%\<rnd>\<rnd2>sdcml.exe"where rnd3 is a random sequence of letters.
To ensure that its process is unique within the system, the Trojan creates a unique ID with the name:
M192A9959A495455c9A91F31AD22B6833To obtain additional parameters, the malware connects to the malicious user's server, sending an HTTP request of the following format in cycles of 30-second intervals:
GET /mod/ HTTP/1.1 User-Agent: Microsoft Internet Explorer Host: ai***hk.com Connection: Keep-AliveAt the time of writing, this link was inactive.
After obtaining additional data from the server, the Trojan obtains access to the reading and writing of files located on the ftp server:
ftp://ai***hk.com/modThe malware also searches for the following strings:
index indix default main home login auth user check head headerA footer top start counters redirect go in out feedback feed contact support page news blog forum stat process upload payment test restorein files with the extensions:
php htm html aspxand also in the files "htm.php" and "html.php".
If your computer does not have an antivirus, and is infected by this malicious program, follow the instructions below to delete it:
%Temporary Internet Files%
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.