Home / malwarePDF  

TrojanDownloader:Win32/Kanav.F


First posted on 02 February 2013.
Source: Microsoft

Aliases :

TrojanDownloader:Win32/Kanav.F is also known as Trojan/Win32.OnlineGameHack (AhnLab), W32/Alyak.A (Norman), Win32/Alyak.F trojan (ESET), Trojan.ADH (Symantec).

Explanation :



Installation

TrojanDownloader:Win32/Kanav.F creates a copy of itself as:

%ProgramFiles%\Common Files\Apple\Mobile Device Support\apple.exe

It creates the following registry so that its copy automatically runs every time your computer starts:

In subkey: HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\<random CLSID>
Sets value: "stubpath"
With data: "%ProgramFiles%\Common Files\Apple\Mobile Device Support\apple.exe"



Payload

Downloads other malware

TrojanDownloader:Win32/Kanav.F queries certain websites, such as the following:

  • blog.daum.net
  • i.sohu.com
  • hi.baidu.com


The website may return an encrypted string. When decrypted, the string tells the malware where to download and run other files. Some examples are:

  • www.bignews.co.kr/<blocked>/b4.gif - detected as Trojan:Win32/Qhost.HB
  • ezyeconomy.com/<blocked>/2011071/o5.gif - the file is currently not available


Deletes gaming settings

TrojanDownloader:Win32/Kanav.F deletes the following registry entry, if you have it in your computer:

HKCU\Software\Blizzard Entertainment\Battle.net\Identity

Steals information

TrojanDownloader:Win32/Kanav.F may steal the following information about your computer, which it sends to "exeinfo1.org":

  • CPU ID
  • Windows version
  • MAC address




Analysis by Stefan Sellmer

Last update 02 February 2013

 

TOP