Table of Contents

Goldun/Haxspy

General

Method of propagation:

Platforms / OS:

Side effects:

Files

File: Install.exe Hash: 601b43c39f726d975f035cc98c146f99

This trojan may have any of the standard icon like Microsoft Word Document or JPEG Image.

The following files are created:

– %SYSDIR%\wndtx1.dll Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Hash: bed399d56b82369eb7fb95caad16de04 Detected as: TR/Dldr.Bolol.A.4, PWS-Goldun (Password Stealer trojan)

– %SYSDIR%\ipudpb2.sys Hash: 14ab6317620fb234c436f8114fab7f26 Detected as: TR/Spy.Haxspy.AE, BackDoor-BAC.sys (Remote Access trojan)

Registry

The following registry keys are added:

– [HKLM\SYSTEM\CurrentControlSet\Control]

– [HKLM\SYSTEM\CurrentControlSet\Services\ipudpb2]

– [HKLM\SYSTEM\CurrentControlSet\Services\ipudpb2\Enum]

New value:

Backdoor

Contact server: The following:

As a result it may send information and remote control could be provided. This is done via the HTTP GET and POST method using a PHP script.

Sends information about:

Stealing

It tries to steal the following information: – Passwords typed into 'password input fields'

– A logging routine is started after one of the following websites are visited:

– It captures:

Injection

– It injects the following file into a process: %SYSDIR%\wndtx1.dll

  All of the following processes:
* iexplore.exe
* %all processes started after malware is active in memory%

Rootkit Technology

It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.

Hides the following:

Method used:

Hooks the following API functions:

File details

Runtime packer: In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:

– Main.FredPettis - 26 Mar 2009