Home / malwarePDF  

Trojan:Win32/Hiloti.gen!A


First posted on 16 April 2009.
Source: SecurityHome

Aliases :

Trojan:Win32/Hiloti.gen!A is also known as Also Known As:Troj/Virtum-Gen (Sophos), Win32/Vundo.CGP (CA), Vundo (McAfee), :Trj/Downloader.MDW (Panda), Trojan.Vundo (Symantec).

Explanation :

Trojan:Win32/Hiloti.gen!A is the generic detection for a family of trojans related to the Trojan:Win32/Vundo family but with less obfuscation. It may download potentially malicious files from a remote server and report system information back to the server.

Symptoms
There are no common symptoms associated with this threat. Alert notifications from installed antivirus software may be the only symptom(s).

Trojan:Win32/Hiloti.gen!A is the generic detection for a family of trojans related to the Trojan:Win32/Vundo family but with less obfuscation. It may download potentially malicious files from a remote server and report system information back to the server.

Installation
Upon execution, Win32/Hiloti.gen!A copies itself in the Windows folder as a DLL file with a random name, for example:
%windir%wrifocemuvap.dll It then modifies the system registry so that its copy runs every time Windows starts: Adds value: "<random string>"
With data: "rundll32.exe %windir%<malware file name>,e"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun For example: Adds value: "Pwulinubesida"
With data: "rundll32.exe %Windir%Plakafaripecil.dll,e"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionRun It also creates the following registry modification as part of its malicious routine: Adds value: "<entry ID>"
With data: "<number>"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersion<string> where <entry ID> and <string> are random strings generated by this trojan based on information from the local machine. For example: Adds value: "Sheqid"
With data: "54"
To subkey: HKLMSOFTWAREMicrosoftWindowsCurrentVersionPhuxobab It creates a mutex to ensure that only one copy of itself is running at startup. The mutex name varies, for example:

  • 6d5ac198
  • 71981d42


  • Payload
    Connects to a Remote ServerWin32/Hiloti.gen!A may connect to the following server, possibly to download files or to report system information:
  • zfsearch.com
  • liftupgate.com
  • The downloaded files may be detected as other malware.

    Analysis by Patrik Vicol

    Last update 16 April 2009

     

    TOP