Method of propagation:
Platforms / OS:
Side effects:
File: Install.exe Hash: 601b43c39f726d975f035cc98c146f99
This trojan may have any of the standard icon like Microsoft Word Document or JPEG Image.
The following files are created:
– %SYSDIR%\wndtx1.dll Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Hash: bed399d56b82369eb7fb95caad16de04 Detected as: TR/Dldr.Bolol.A.4, PWS-Goldun (Password Stealer trojan)
– %SYSDIR%\ipudpb2.sys Hash: 14ab6317620fb234c436f8114fab7f26 Detected as: TR/Spy.Haxspy.AE, BackDoor-BAC.sys (Remote Access trojan)
The following registry keys are added:
– [HKLM\SYSTEM\CurrentControlSet\Control]
“[%random character string%[%current username% ]”
– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
wndtx1]
* “DllName”
wndtx1.dll“wndtx1”
* “Impersonate”
dword:00000001dword:00000001
* “MaxWait”
dword:00000001– [HKLM\SYSTEM\CurrentControlSet\Services\ipudpb2]
dword:00000001
* “Start”
dword:00000001dword:00000000
* “ImagePath”
\??\%SYSDIR%\IPUDPB2.SYS“IP2 UDPB2”
– [HKLM\SYSTEM\CurrentControlSet\Services\ipudpb2\Security]
* “Security”
%hex values%– [HKLM\SYSTEM\CurrentControlSet\Services\ipudpb2\Enum]
“Root\\LEGACY_IPUDPB2\\0000”
* “Count”
dword:00000001dword:00000001
The following registry key is changed:
– [HKLM\SYSTEM\CurrentControlSet\Control\Session Manager]
Old value:
* “PendingFileRenameOperations”
%hex values%New value:
Contact server: The following:
As a result it may send information and remote control could be provided. This is done via the HTTP GET and POST method using a PHP script.
Sends information about:
It tries to steal the following information: – Passwords typed into 'password input fields'
– A logging routine is started after one of the following websites are visited:
– It captures:
– It injects the following file into a process: %SYSDIR%\wndtx1.dll
All of the following processes: * iexplore.exe * %all processes started after malware is active in memory%
It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.
Hides the following:
Method used:
Hooks the following API functions:
Runtime packer: In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
– Main.FredPettis - 26 Mar 2009