Home / malwarePDF  

PWS:Win32/Zbot.SI


First posted on 26 April 2010.
Source: SecurityHome

Aliases :

PWS:Win32/Zbot.SI is also known as PWS-Zbot.gen.ab (McAfee), TSPY_ZBOT.NCT (Trend Micro), Win32/Spy.Zbot.UN (ESET), Trojan.Zbot (Symantec), Trojan-Spy.Win32.Zbot.ahvy (Kaspersky).

Explanation :

PWS:Win32/Zbot.SI is a password-stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected computer.
Top

PWS:Win32/Zbot.SI is a password-stealing trojan. Win32/Zbot also contains backdoor functionality that allows unauthorized access and control of an affected computer. InstallationPWS:Win32/Zbot.SI may arrive via a spammed e-mail message having a PDF attachment masquerading as a delivery notice from the "Royal Mail" with a file name similar to "Royal_Mail_Delivery_Invoice_1092817.pdf". The PDF attachment contains an embedded executable Win32/Zbot payload. If the user opens the documents using a version of Adobe Reader that is vulnerable to a certain software flaw and clicks through a series of dialog boxes, the vulnerability could be exploited that allows documents to automatically launch the embedded executable. Upon execution, the trojan drops a copy of itself in the system as:

  • <system folder>\sdra64.exe
  • Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP and Vista is C:\Windows\System32. It then modifies the registry to execute this file at each Windows start. Modifies value: "userinit"With data: "<system folder>\userinit.exe,<system folder>\sdra64.exe,"In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon When "sdra64.exe" executes, it injects other code into the running process "winlogon.exe", which in turn injects code into other running processes, including the following, for example:
  • explorer.exe
  • lsass.exe
  • services.exe
  • smss.exe
  • spoolsv.exe
  • svchost.exe
  • winlogon.exe
  • wauclt.exe
  • Payload Steals sensitive informationThe Zbot family of malware is used to obtain sensitive information from the affected system, such as:
  • Trusted Web site certificates
  • Cached Web browser passwords
  • Cookies
  • PWS:Win32/Zbot.SI creates the following encrypted log file under a hidden folder, in which it presumably writes all stolen data:
  • <system folder>\lowsec\user.ds
  • Contacts remote site for instruction/Downloads and executes arbitrary files After installation, PWS:Win32/Zbot.SI attempts to contact the remote IP address "59.44.60.152" at TCP port 6010 to download additional instructions (which may be in the form of a configuration file) and/or arbitrary files to execute. Allows remote backdoor access and control Zbot can be instructed to perform a host of actions by a remote attacker for additional instructions including the following:
  • Rename itself
  • Obtain certificates and other stolen information
  • Block specified URLs
  • Download and execute arbitrary files
  • Establish a Socks proxy
  • PWS:Win32/Zbot.SI opens and listens on TCP port 18691 for additional instructions from a remote attacker. Additional Information PWS:Win32/Zbot.SI may make the following additional registry modifications: Sets value: "UID"
    With data: "avm<computer-specific ID>"
    To subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Network

    Analysis by Wei Li

    Last update 26 April 2010

     

    TOP