Home / malwarePDF  

Backdoor:Win32/Remosh.A


First posted on 13 August 2010.
Source: SecurityHome

Aliases :

Backdoor:Win32/Remosh.A is also known as TR/Spy.Gen (Avira), Trojan.Win32.Agent.egli (Kaspersky), TROJ_AGENTT.SML (Trend Micro).

Explanation :

Backdoor:Win32/Remosh.A is a trojan that sends Windows system configuration details to a remote server and also allows remote access and control of the affected computer.
Top

Backdoor:Win32/Remosh.A is a trojan that sends Windows system configuration details to a remote server and also allows remote access and control of the affected computer. InstallationBackdoor:Win32/Remosh.A is installed by a dropper trojan such as Backdoor:Win32/Remosh.A.dr and is present as a DLL component located in the Windows system folder. The DLL runs as a service at Windows start. Below is an example of one observed registry modification made by the trojan dropper after installing Backdoor:Win32/Remosh.A to run as a service: Sets value: "ServiceDll"With data: "<system folder>\hpmdp093.dll"In subkey: HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. It contains the following variables in its code; note that the actual values of the variables may change depending on the malware sample: MUTEXNAME = "NT1630"
SHELLCOMMAND = "shell"
SERVICENAME = "6to4"
SERVICE_DISPLAYNAME = "ASP.NET Services"
SERVICE_DESCRIPTION = ""
DISABLE_IPSEC = "1"
MASTER_HOST = "shell.is-a-chef.com"
MASTER_PORT = "80" The malware checks for a mutex named "MUTEXNAME" to verify that it isn't already running. If found, it exits immediately; if not, it creates the mutex. If the value of "DISABLE_IPSEC" is non-zero, the trojan stops and disables the "PolicyAgent" service, which is the IPSec service. Win32/Remosh registers itself to run as a service named "SERVICENAME", with a display name "SERVICE_DISPLAYNAME" and a description as "SERVICE_DESCRIPTION". The service is configured so it cannot be stopped, however it does respond to system shutdown requests. Payload Allows remote access and controlEvery 30 seconds, the malware establishes a TCP connection to "MASTER_HOST" on port "MASTER_PORT" - all subsequent communication is encrypted. The trojan sends system information (computer name, processor information, OS version). The trojan accepts commands from the server if the server reply starts with "SHELLCOMMAND"; commands include the following:

  • enumerate terminal services sessions to show who is logged into the machine
  • enumerate system drives, collecting drive letters, types, free space and volume name
  • enumerate files by path, allowing the server to browse the contents of the file system
  • launch an executable remotely
  • open a remote command shell which allows the server to execute commands
  • enumerate registry keys
  • send screenshots from the local system to the server to show what is happening on the system
  • uninstall itself
  • move, delete or copy a file
  • set file attributes on a file
  • receive a new file from the server.
  • Additional InformationNote that the file name used by this trojan may vary from sample to sample. This is because this trojan is created using a construction toolkit known as "Gh0st Rat". Therefore, certain aspects of the trojan are author-defined such as the following:
  • Mutex name
  • Service name
  • Service display name
  • Service description
  • IPSEC options
  • Command and control server domain name
  • Command and control communication port


  • Analysis by Aaron Putnam

    Last update 13 August 2010

     

    TOP