Home / malwarePDF  

TrojanDownloader:Win32/Bulilit.A


First posted on 29 October 2010.
Source: SecurityHome

Aliases :

TrojanDownloader:Win32/Bulilit.A is also known as Trojan.Win32.Swisyn.aiub (Kaspersky).

Explanation :

TrojanDownloader:Win32/Bulilit.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer.
Top

TrojanDownloader:Win32/Bulilit.A is a trojan that silently downloads and installs other programs without consent. This could include the installation of additional malware or malware components to an affected computer. Installation TrojanDownloader:Win32/Bulilit.A creates the following files on an affected computer:

  • <system folder>\dx5.exe - detected as TrojanDownloader:Win32/Bulilit.A
  • <system folder>\xvhost.sb
  • c:\rec.bat
  • c:\documents and settings\administrator\local settings\temp\svchost.exe - detected as Trojan:Win32/Killav.FA
  • c:\documents and settings\administrator\local settings\temp\is-46adc.tmp\is-tbi1h.tmp
  • c:\documents and settings\administrator\local settings\temp\is-dno7u.tmp\_iscrypt.dll
  • c:\documents and settings\administrator\local settings\temp\is-dno7u.tmp\_isetup\_shfoldr.dll

  • Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
    The malware modifies the following registry entries to ensure <system folder>\dx5.exe executes at each Windows start:

    In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Adds value: "RunmeAtStartup"
    With data: "c:\windows\system32\dx5.exe"
    Payload Contacts remote host TrojanDownloader:Win32/Bulilit.A may contact a remote host at a8d61.3bc6ad2ed.com using port 90. Commonly, malware may contact a remote host for the following purposes:
    • To report a new infection to its author
    • To receive configuration or other data
    • To download and execute arbitrary files (including updates or additional malware)
    • To receive instruction from a remote attacker
    • To upload data taken from the affected computer

    This malware description was produced and published using our automated analysis system's examination of file SHA1 5579b1f2e874f0dd6cf49d6e94fc2cbf03d26bd0.

    Last update 29 October 2010

     

    TOP