Lavasoft Security Bulletin: April 2013

Top20 Blocked Malware

Position Ad-Aware detection % of all threats Change in ranking
1 Win32.Trojan.Agent 30.54% +3.56%
2 Trojan.Win32.Generic!BT 27.12% -2.01%
3 Trojan.Win32.Generic.pak!cobra 2.95% -0.46%
4 Virus.Win32.Sality.r 2.44% new
5 Trojan.Win32.AutoIt.gen.1 2.36% new
6 Virus.Win32.Sality.at 2.09% -0.41%
7 Malware.JS.Generic 2.04% -0.17%
8 Virus.Win32.Sality.ah 1.72% +0.27%
9 Email-Worm.Win32.Brontok.a 1.42% +0.64%
10 Virus.Win32.Sality.am 1.25% new
11 Virus.Win32.Ramnit.b 1.07% +0.48%
12 Worm.Win32.Pykspa 1.01% new
13 Virus.Win32.Ramnit.a 0.98% +0.15%
14 INF.Autorun 0.90% -0.23%
15 Trojan.Win32.Ramnit.c 0.86% -1.26%
16 Virus.VBS.Ramnit.a 0.83% -2.09%
17 HackTool.Win32.Keygen 0.81% -0.22%
18 Trojan.Win32.Sirefef.bb 0.70% +0.12%
19 Trojan.Win32.Jpgiframe 0.43% -0.43%
20 Heur.HTML.MalIFrame 0.27% -0.29%

The Top 20 malicious programs blocked on PCs

April sees a position change for the most prevalent generic detections: Trojan.Win32.Generic!BT and Win32.Trojan.Agent. Compared to March, new modifications of Sality Virus.Win32.Sality.r and Virus.Win32.Sality.am entered the Top 20 at positions 4 and 10 respectively. A new generic detection for Trojans written in the AutoIt script language – Trojan.Win32.AutoIt.gen.1 – entered the Top 20. A new Worm.Win32.Pykspa, a worm that can provide an attacker remote access to a compromised system, also appears in the Top 20. The worm spreads via Skype, Twitter network shares and removable drives, prevents users from visiting internet resources belonging to antivirus companies, and ends processes belonging to various utilities for diagnosing infected system,including antivirus products.

New Incomings to the Lab

Let’s review and consider information on the number of unique files with the same detection name.

Position Ad-Aware detection % of all threats Change in ranking
1 Trojan.Win32.Generic!BT 36.37% +6.61%
2 Trojan.Win32.Generic.pak!cobra 3.57% +1.05%
3 Virus.Win32.Expiro.bc 1.70% -0.06%
4 Virus.Win32.Virut.ce 1.59% +0.21%
5 Trojan.Win32.Medfos.m 1.35% -0.05%
6 Trojan.Win32.Dwnldr.y 1.29% -0.01%
7 Worm.Win32.Mabezat.b 0.57% +0.22%
8 Trojan.JS.Obfuscator.aa 0.56% +0.11%
9 Trojan.Win32.Winwebsec.fd 0.54% -0.02%
10 Trojan.Win32.Vobfus.paa 0.49% -0.00%
11 Malware.JS.Generic 0.48% +0.1%
12 Virus.Win32.PatchLoad.d 0.41% +0.08%
13 Win32.Malware!Drop 0.41% +0.17%
14 Trojan.JS.IFrame.i 0.37% +0.00%
15 Trojan.Win32.Generic!SB.0 0.29% +0.05%
16 Trojan.Win32.Tepfer.a 0.24% -0.19%
17 TrojanPWS.Win32.OnLineGames.ahj 0.24% new
18 Trojan.Win32.Autorun.dm 0.19% +0.02%
19 Trojan-PWS.Win32.Zbot.aql 0.20% +0.00%
20 Trojan.Win32.Urelas.a 0.18% new

New malicious programs entered the Top 20

April sees two new families, TrojanPWS.Win32.OnLineGames.ahj and Trojan.Win32.Urelas.a, at position 17 and 20 respectively.

TrojanPWS.Win32.OnLineGames.ahj is a dynamic-link library (DLL). It is an Internet Explorer Browser Helper Object (BHO) that is run when Internet Explorer launches. It collects data users enter on online game web sites sending the stolen data to attackers’ servers.

Trojan.Win32.Urelas.a provides an attacker with remote access to the infected computer. Taking commands from the CC server, the Trojan downloads its updates and other malicious programs, steals user’s confidential data, and collects information about the system.

This month our automatic analysis system detected an increase of ransom Trojans among Trojan.Win32.Generic!BT generic detections. Let’s consider some of them as well as options for manually removing these threats from the infected computer.

Example 1. This is what the malicious program preventing the computer from performing properly looks like:

Ransomware (MD5: 627e226a5924634651c264f033b1ba33) is detected by Ad-Aware as Trojan.Win32.Generic!BT

The Trojan is easily removed in Windows Safe Mode. The Trojan body needs to be removed from the current user's Windows directory:

%Documents and Settings%\%CurrentUser%\%AppData%\top1.exe

As well as autorun registry key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"top" = "%Documents and Settings%\%CurrentUser%\%AppData%\top1.exe"

The attackers’ server, from which an html-page blocking the computer performance is loaded, is located in Germany:

Example 2. This is what the malicious program preventing the computer from performing properly looks like:

Ransomware (MD5: 2a1864a89a64b3617fc5f233ed3f604c) is detected by Ad-Aware as Trojan.Win32.Generic!BT

It is more complicated to remove this Trojan. This is because the Trojan makes reference to itself in a more obscure registry value:

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Shell" = "%Documents and Settings%\%CurrentUser%\%AppData%\Battleshield.exe"

To prevent the Trojan from launching automatically in safe mode, Windows can be started in safe mode with command line support using the following commands to remove the autorun capability:

reg delete "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Shell

del "%Documents and Settings%\%CurrentUser%\%AppData%\Battleshield.exe"

The attackers’ server from which an html-page blocking the computer performance is loaded is located in Germany:

Example 3. This is how the malicious program preventing the computer from performing properly looks like:

Ransomware (MD5: b4cb159208511637ca06e78dbfb0af97) is detected by Ad-Aware as Trojan.Win32.Generic!BT

It is much complicated to remove this Trojan as attackers have made efforts to prevent deleting the malicious program in safe mode. After infection, the Trojan removes all keys from the registry branch:

[HKLM\System\CurrentControlSet\Control\SafeBoot]

This leads to BSOD when attempting to start Windows in safe mode:

The Trojan copies itself to the current user's Windows temporary folder:

%Temp%\WindowsUpdate.exe

If more than one user have access to the infected computer, it is possible to use the "Win+L" hot key to sign in Windows from different accounts. Afterwards, it is possible to remove the worm body and autorun registry key:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"WindowsUpdate.exe" = "%Temp%\WindowsUpdate.exe"

And restore the registry branch:

[HKLM\System\CurrentControlSet\Control\SafeBoot]

Otherwise, it is required to use CD or USB flash drive to restore the system or cure infected HDD on another system by scanning it with an antivirus program, or manually removing the Trojan body.

The attackers’ server from which an html-page blocking the computer performance is loaded is located in UK:

Ad-Aware antivirus is capable of detecting ransom Trojans infections, as described above. If  your computer is infected by ransom Trojan of this type, do not panic and pay attackers a fee to unlock your computer. It is always possible to cure your system: "Fortune favours the brave".

Skyper

In April, the activity of "Skyper" IRCBot was observed. "Skyper" used social engineering techniques to spread itself using instant messaging services:

Malware memory damp fragment

If any instant messaging software was installed on the infected computer, the malware sent messages containing a link to its body to all contacts from the list. The malware works out the locale of the infected OS and sends random phrases in the corresponding language.

Text message sample for the Italian locale

Afterwards, a link created using Goo.gl service was added to the text.

http://www.goo.gl/***?image=IMG0540240-JPG

A peculiarity of the worm is installing a module designed to launch a bitcoin generator on the infected computer. The process used for bitcoin mining calculations generates significant load on the affected machine.

A process of malware module responsible for bitcoin generation

Attackers continue using various social engineering techniques to spread malware. This effective technique allows for the creation huge botnets. The chances are very high that someone receiving from a friend a message that contains the "You look so beautiful on this picture" text, along with a link, will click that link for sure.

Bitcoin mining remains a profitable business for attackers. Bitcoin currency rates help demonstrate this; the price of one BTC recently reached 260$. Sensing easy money, criminals surreptitiously install Bitcoin mining software on zombie machines in botnets.

Bitcoin Charts, resource: Mtgox

 You can read a more detailed description of spreading techniques and payload of this malware in our Malware Encyclopedia.

Top20 Potentially Unwanted Programs

Below are the Top20 Potentially Unwanted Programs blocked by Ad-Aware on user’s PCs. These are advertising software, browser toolbars, search engines and other programs which change browser start pages and other system settings.

Position Ad-Aware detection % of all threats Change in ranking
1 MyWebSearch 22.61% -6.7%
2 Adware.Linkury 18.18% new
3 Win32.Toolbar.Iminent 9.63% -6.04%
4 Win32.PUP.Bandoo 7.08% -2.56%
5 SweetIM 5.55% -1.66%
6 Bprotector 4.46% -1.94%
7 Wajam 2.36% +0.42%
8 Yontoo 2.27% +0.04%
9 Babylon 1.71% -1.03%
10 1ClickDownloader 1.44% new
11 InstallBrain 1.40% -0.5%
12 Artua Vladislav 1.40% -0.27%
13 DownloadMR 1.35% +0.05
14 CoolMirage Ltd 1.35% new
15 GamePlayLabs 1.17% -0.12%
16 DomaIQ 1.15% new
17 ExpressFiles Installer 1.11% new
18 Win32.Adware.ShopAtHome 1.10% -0.44%
19 BetterInstaller 1.10% new
20 Click run software 1.0% -0.37%

Top20 PUPs detected on user’s PC

Operating Systems

Infections by OS

Geographic Location

Infections by country of origin

We will keep investigating the epidemiological situation in the world and informing our readers about new malicious code samples in the next Lavasoft Security Bulletin.

  • Back to articles


  • Share this post:    Twitter Facebook