W32/DNSChanger.A!tr

description-logoAnalysis

W32/DNSChanger.A!tr - 06-01-10


General Info:

This threat is a "PE" executable file, with file size 28160

Files:

  • Drop files: ".exe" + ".dll"

Installation to System:

  • When run, it copies itself to:
    - It doesn't copy itself ; - it does delete the initial file.
  • Drops the following files:
    - It drops the file idemlog.exe in the undefinedSystemundefined folder - this threat is known as W32/AdClicker.BM!bdr, which then drops other files. - It drops the file q930956218_disk.dll in the undefinedWINDOWSundefined folder - this threat is know as W32/Delf.ZU-dldr. - It drops the
  • And creates these registry entries:
    - It modifies the DNS entries to make them point to an Ukrainian webhosting server : HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\[id]\NameServer = 85.255.113.138,85.255.112.79 - The dropped malwares also modify the registry.

More Info:

This trojan modifies the NameServer registry entries to make them point to 85.255.113.138 and 85.255.112.79 - these are the nameservers of the Ukrainian InHost webhosting service. This technique is often used by pharmers to transparently redirect the users browsers to false online banking or auctions services : when the user type in the URL, the DNS request is transmitted to either a poisoned or private NameServer which then provide the IP address of a server controlled by the attacker.

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
FortiMail
FortiSandbox
FortiWeb
Web Application Firewall
FortiIsolator
FortiDeceptor
FortiEDR

Version Updates

Date Version Detail
2023-04-04 91.02050
2023-03-07 91.01211
2023-01-31 91.00156
2022-05-31 90.02802
2020-10-20 81.23000 Sig Updated
2020-08-24 79.87500 Sig Updated
2020-04-07 76.53400 Sig Updated
2020-01-03 74.27800 Sig Updated
2019-12-10 73.69300 Sig Updated
2019-12-05 73.58000 Sig Updated