First posted on 20 June 2007.
Source: SecurityHome
Trojan-Proxy:W32/Xorpix.AR is also known as  Trojan-Proxy.Win32.Xorpix.ar.
Trojan-Proxy:W32/Xorpix.AR injects its code to the process WINLOGON.EXE. It then opens Internet Explorer and acts as a proxy server.
 Upon execution, the file detected as Trojan-Proxy.Win32.Xorpix.ar will drop DLL files with the following filenames:
 
 - bot.dll
  - dn.dll
  - partneship.dll
  
 
It will then create the following registry entries:
 
 - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotify\%dll_name%reg
DllName "C:Documents and SettingsAll UsersDocumentsSettings\%dll_name%.dll"
Startup "%dll_name%reg"
Impersonate dword:00000001
Asynchronous dword:00000001
  
 
Note: %dll_name% represents the filename of the dropped DLL.
Here are the registry entries:
 
 - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifypartnershipreg
DllName "C:Documents and SettingsAll UsersDocumentsSettingspartnership.dll"
Startup "partnershipreg"
Impersonate dword:00000001
Asynchronous dword:00000001  - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifynreg
DllName "C:Documents and SettingsAll UsersDocumentsSettingsn.dll"
Startup "bnreg"
Impersonate dword:00000001
Asynchronous dword:00000001  - HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogonNotifyotreg
DllName "C:Documents and SettingsAll UsersDocumentsSettingsot.dll"
Startup "botreg"
Impersonate dword:00000001  - Asynchronous dword:00000001
  
 
Xorpix.AR will then inject its code to the process Winlogon.exe. It then opens an instance of Internet Explorer and uses a random port to act as a proxy server.
Last update 20 June 2007
 
TOP