Home / malwarePDF  

Trojan:Win64/Sirefef.AA


First posted on 18 July 2012.
Source: Microsoft

Aliases :

Trojan:Win64/Sirefef.AA is also known as Backdoor.Win32.ZAccess.tzm (Kaspersky), Win64/Sirefef.AN trojan (ESET), ZeroAccess (McAfee), Mal/ZAccess-CA (Sophos), TROJ_SIREFEF.UP (Trend Micro).

Explanation :



Trojan:Win64/Sirefef.AA is a user-mode component of the Sirefef malware family and runs on the 64-bit version of Windows. Sirefef is a multi-component family that performs different functions, such as downloading updates and additional Sirefef components, hiding existing Sirefef components or performing a payload. This malware moderates your Internet experience by changing search results, and generating pay-per-click advertising revenue for the malware controllers.

Installation

Trojan:Win64/Sirefef.AA is installed and executed by other variants of Sirefef and may have the file name "<numbers>.@", for example, "80000064.@".

It may create the mutex "Global\197A8FD4-6D77-4B12-814A-0875ECC1993B" to ensure that only one instance of itself is running.



Payload

Restarts the computer

Trojan:Win64/Sirefef.AA may turn the computer off, requiring you to manually turn it back on, by setting the power state to "POWER_STATE_CRITICAL". This is known as a "cold boot".

Redirects search results

Trojan:Win64/Sirefef.AA redirects results for searches conducted using the following websites:

  • ask.com
  • bing.com
  • google.*
  • search.icq.com
  • search.yahoo.*


where * is any top level domain such as ".com", ".co.uk", or ".ca".

It may redirect seach results to certain domains, which may contain malicious content.

Additional information

For more information about Win32/Sirefef, read the family description here.



Analysis by Andrei Florin Saygo

Last update 18 July 2012

 

TOP