Lavasoft Security Bulletin: September 2012

Top20 Blocked Malware

Position Ad-Aware detection % of all threats Change in ranking
1 Win32.Trojan.Agent 32.62% -2.75%
2 Trojan.Win32.Generic!BT 18.79% -0.22%
3 3.86% +1.74%
4 Virus.VBS.Ramnit.a 2.89% +0.78%
5 Virus.Win32.Sality.ah 2.86% +0.33%
6 Win32.Backdoor.Zaccess 2.80% +1.41%
7 Malware.JS.Generic 1.99% -0.07%
8 LooksLike.Win32.Malware!vb 1.88% new
9 Trojan.Win32.Generic.pak!cobra 1.87% -0.66%
10 Email-Worm.Win32.Brontok.a 1.69% +0.27%
11 Heur.HTML.MalIFrame 1.31% +0.33%
12 Trojan.Win32.Ramnit.c 1.18% +0.17%
13 Trojan.Win32.Jpgiframe 0.94% +0.11%
14 Virus.Win32.Ramnit.b 0.92% -0.38%
15 Trojan.Win32.Generic!SB.0 0.85% -0.25%
16 Virus.Win32.Virut.a 0.67% +0.01%
17 Virus.Win32.Virut.ce 0.63% new
18 HackTool.Win32.Keygen 0.63% +0.06%
19 Trojan-Clicker.HTML.Iframe 0.61% +0.15%
20 Trojan.Win32.AutoIT.gen 0.53% new

 The Top 20 malicious programs blocked on PCs

September sees changes in the Top 20: a new generic detection LooksLike.Win32.Malware!vb has entered the Top 20 coming in 8th position. Malicious programs written on Visual Basic  are detected as LooksLike.Win32.Malware!vb. Malicious functions of such malware programs (email worms, Trojans stealing confidential data, viruses, Trojan-downloaders, etc.) may be extensive and sophisticated enough. The Win32.Trojan.Agent и Trojan.Win32.Generic!BT generic detections are still on the top positions. The Sality family sees some changes as well.

The Win32.Backdoor.Zaccess backdoor entered the Top 20 in July coming in 20th position. Rootkit-part of the malware is described here. In September, Sophos company released its second report for ZeroAccess botnet. Working on the new version of ZeroAccess, developers refused using components which run in the kernel mode both on x64 and x86 based systems. Mechanism in P2P networks, infection methods, generating network traffic characteristics, and communication with command server were updated.

According to research results, ZeroAccess reached 9 million installations; number of active bots exceeded one million infected computers all over the world. The United States had the most infected computers. It may be explained by the fact that botnet owners pay 500 USD per 1000 installations in the USA. According to experts, use of click fraud and Bitcoin mining allows botnet owners to earn 100 000 USD per day.

New Incomings to the Lab

Let’s review and consider information on the number of unique files with the same detection name.

Position Ad-Aware detection % of all threats Change in ranking
1 Trojan.Win32.Generic!BT 61.40% -13.17%
2 Malware.JS.Generic 8.23% +4.23%
3 Trojan.Win32.Generic.pak!cobra 5.35% +1.4%
4 Trojan.Win32.Generic!SB.0 1.21% -1.55%
5 not-a-virus:AdWare.Win32.iBryte.x 4.15% +1.4%
6 Virus.Win32.Ramnit.a 5.67% new
7 Virus.Win32.Virut.ce 4.27% +2.48%
8 Trojan.Win32.Medfos.r 1.96% new
9 Worm.Win32.Mabezat.b 1.78% -0.09%
10 Virus.Win32.Neshta.a 1.67% new
11 Trojan.Win32.Ransomer.afh 0.72% -0.29%
12 Worm.Win32.Esfury.ta 0.69% -1.61%
13 Virus.Win32.PatchLoad.d 0.61% new
14 Trojan-Clicker.HTML.RemoteScript 0.49% -0.08%
15 Trojan.JS.Obfuscator.aa 0.38% -0,13%
16 Trojan-Clicker.HTML.Iframe 0.35% +0.04%
17 Trojan.Win32.OnLineGames 0.30% -0.06%
18 Trojan.Win32.Vobfus.paa 0.29% -0.05%
19 Trojan.Win32.Winwebsec.fd 0.28% -1.03%
20 Backdoor.Win32.PcClient 0.22% -0.18%

 New malicious programs entered the Top 20

Trojan.Win32.Medfos.r  is a Trojan which installs additional components to modify search results in Internet Explorer and Mozilla Firefox. The malicious program may be installed on the system by Blackhole Exploit, recently updated.

Virus.Win32.PatchLoad.d is a virus which infects Windows libraries. To infect a system library, attackers use undocumented functions sfc_os.dll or end the utility threads monitoring the system file integrity in winlogon.exe, and disable System File Checker.

The Middle East Cyberwar: Flame Server Reveal

We have recently discussed Gauss which is a part of the Stuxnet/Duqu/Flame malicious chain. In September, Kaspersky Lab published an analysis of Flame’s C&C. According to data analyzed on servers, there are four types of clients with the following names: SP, SPE, FL and IP. Since Flame is denoted as FL, it reveals three more unknown types of Flame malware so far.

 Type of clients connecting to the server

Also antivirus experts revealed the server creation date: December 2006. It coincides with the Bush "Olympic Games" initiative to deal with Iran’s nuclear program. The first evidence of the project was the Stuxnet worm which had successfully destroyed the most of Natanz nuclear centrifuges.

Assessing the scripts’ code, experts saw comments indicating at least four different developers. An interesting fact is that the server has been designed as if it had no relation to the botnet operation. There were no such terms as "bot", "infection" and "command". It was a C&C interface contained such folders as "news", "ads" where a set of commands was stored in archives to be further downloaded by clients.

According to the Kaspersky Lab expert estimations, the amount of stolen data was 5.5 Gb per week (from 25th of March till 2nd of April) from more than 5 thousands unique IP addresses, mostly Iran and Sudan.

0-Day Exploit. Made in China

Several 0-day vulnerabilities were fixed by Microsoft on Friday 21st of October with Security Update MS012-063. The vulnerabilities could allow remote execution when a user opens a malicious html page by Internet Explorer 6-9. Two days early, Microsoft published "Fix it KB2757760" – a special configuration tool that blocks known exploits on user’s computers. The attack scheme was pretty simple and described by AlienVault Labs. The exploit.html page loaded a flash file "Moh2010.swf" ("Grumgog.swf") encrypted using the DoSWF tool.

 Encrypted SWF file (MD5: eb62e0051ad4ab3f626d148472dfa891)

The SWF file sprayed a shellcode with the malicious payload in the memory and loaded "Eternalian.html" ("Protect.html") which triggered the actual vulnerability.

Decrypted SWF file with exploit 

We could run SWF exploit under Internet Explorer version 8 with the latest Flash Player 11. Below IFrame, there is encrypted shellcode which downloads and executes "111.exe" file (MD5: 8d326300a6f4dfe93a456c4c185bf2a8) from the compromised website.

Now the web folder is clean except the "exp.txt" file with "eromang" string which points to the security researcher Eric Romang who has found this exploit.

The file "111.exe" which is supposed to be dropped to a user’s computer is detected by Ad-Aware as Trojan.Generic.BT and Microsoft as Backdoor:Win32/Poison.BR (VirusTotal). The backdoor could connect to C&C server to get commands for downloading and installing new pieces of malware.

Backdoor inject with C&C details

More information about Trojan’s payload you can find in our Malware Encyclopedia.

The AlienVault researchers assume that Chinese hacker WHG is behind of this attack. He seems to be also related to the “The Network Crack Program Hacker” group (NCPH) as one of the developers of the GinWui rootkit.

Top20 Potentially Unwanted Programs

Below is Top20 Potentially Unwanted Programs blocked by Ad-Aware on user’s PCs. These are advertising software, browser toolbars, search engines and other programs which change browser start pages and other system settings.

Position Ad-Aware detection % of all threats Change in ranking
1 MyWebSearch 32.78% -1.4%
2 Win32.Toolbar.Iminent 15.43% -0.01%
3 SweetIM 13.93% +2.66%
4 Win32.PUP.Bandoo 8.80% -0.97%
5 Win32.Toolbar.SearchQU 3.17% -0.35%
6 Win32.Toolbar.Mediabar 1.92% -0.16%
7 Artua Vladislav 1.66% -0.03%
8 Win32.PUP.Predictad 1.41% -0.09%
9 Click run software 1.33% -0.08%
10 Yontoo 1.19% -0.03%
11 RelevantKnowledge 1.13% +0.11%
12 Win32.Adware.ShopAtHome 1.05% -0.37%
13 Via Advertising 0.88% -0.04%
14 GameVance 0.77% -0.34%
15 GamePlayLabs 0.64% new
16 Win32.Adware.Offerbox 0.50% -0.05%
17 Adware.Win32.Facetheme 0.20% new
18 BProtector 0.22% -0.39%
19 Zango 0.20% -0.04%
20 Adware.Eorezo.a 0.14% +0.01%

Top20 PUPs detected on user’s PC

See below examples of PUPs collected by our laboratory:

Example 1 PUPs Click run software

Example 2 PUPs Click run software

Example 3 PUPs Click run software

Operating Systems

Infections by OS

Geographic Location

Infections by country of origin

We will keep investigating the epidemiological situation in the world and informing our readers about new malicious code samples in the next Lavasoft Security Bulletin.

  • Back to articles

  • Share this post:    Twitter Facebook

    Our best antivirus yet!

    Fresh new look. Faster scanning. Better protection.

    Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

    For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

    Download adaware antivirus 12
    No thanks, continue to
    close x

    Discover the new adaware antivirus 12

    Our best antivirus yet

    Download Now