eFax spam campaign delivers info stealer Trojan (Oct 26, 2012)
Dell SonicWALL UTM Research team discovered a new info stealer Trojan in the wild that steals account information from FTP and Email configuration files. The Trojan also drops a variant of the Zbot Trojan on the system.
The Trojan arrives in the form of an email purporting to be a fax message delivered by eFax Corporate. The user is encouraged to download and execute the attachment to view the fax:
Upon infection the Trojan performs the following DNS queries:
- dechotheband.gr
- barisdogalurunler.com
- alpertarimurunleri.com
- oneglobalexchange.com
- rumanas.org
- www.10130138.wavelearn.de
- visiosofttechnologies.com
- sgisolution.com.br
- plusloinart.be
- marengoit.pl
- www.google.com
The Trojan adds the following files to the filesystem:
- %USERPROFILE%Local SettingsTemp215229.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp220286.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp224803.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp227637.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp230491.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp231913.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp233065.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp249648.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %USERPROFILE%Local SettingsTemp252302.exe [Detected as GAV: Zbot.AAN_62 (Trojan)]
- %APPDATA%Ettohxiud.exe [Detected as GAV: Zbot.EQLN_2 (Trojan)]
- %USERPROFILE%Local SettingsTempabcd.bat
abcd.bat contains the following data. This is used to clean up parts of the infection process:
:ijk
del %1
if exist %1 goto
ijk
del %0
The Trojan adds the following key to the Windows registry to enable startup after reboot:
- HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun {C05E9BBE-21ED-AD41-CB90-673CEB12442E} “%APPDATA%Ettohxiud.exe”
The Trojan downloads and runs the following files [All detected as GAV: Zbot.AAN_62 (Trojan)] from various remote webservers:
The following encrypted communication was observed between the Trojan and a remote C&C webserver:
The unencrypted form of the above “CRYPTED” data that is sent is as follows. It contains sensitive system information::
The Trojan was observed iterating through the Program Files directory looking for FTP and Email configuration files. It steals credentials from the following FTP and Email softwares if present.
BulletProof FTP
Smart FTP
Turbo FTP
Sota's FTP
FTP Navigator
FTP Commander
FlashFXP
FileZilla
Cute FTP
Core FTP
Ultra FXP
Frigate3
FTP Explorer
SecureFX
Classic FTP
FTPVoyager
Wise FTP
SeaMonkey
Leech FTP
FTPGetter
3D-FTP
Go FTP
BlazeFtp
FTPNow
Pocomail
The Bat!
Thunderbird
The Trojan contains the following common word password list:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
- GAV: Androm.EFX
- GAV: Tepfer.AIUQ
- GAV: Zbot.EQLN_2
- GAV: Zbot.AAN_62