Win32/Cimag [Threat Name] go to Threat

Win32/Cimag.AM [Threat Variant Name]

Category trojan
Size 43520 B
Detection created Jun 29, 2009
Detection database version 4196
Aliases Trojan-Downloader.Win32.Mufanom.eq (Kaspersky)
  Hiloti.gen (McAfee)
  TROJ_HILOTI.AD (TrendMicro)
Short description

Win32/Cimag.AM is a trojan which tries to download other malware from the Internet.

Installation

When executed, the trojan creates one of the following files:

  • %windir%\­%variable%.dll (15872 B)
  • %appdata%\­%variable%.dll (15872 B)

A string with variable content is used instead of %variable% .


Libraries with the following names are injected into all running processes:

  • %variable%.dll

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • %variable% = "rundll32.exe "%filepath%",e"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • %variable% = "rundll32.exe "%filepath%",e"

The following Registry entries are created:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­%variable%]
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­%variable%]
Other information

The trojan contains a list of URLs. It tries to download several files from the addresses.


These are stored in the following locations:

  • %windir%\­%variable%.dll
  • %appdata%\­%variable%.dll

The files are then executed.


It can send various information about the infected computer.


The trojan collects the following information:

  • user name
  • operating system version

The HTTP protocol is used.

Please enable Javascript to ensure correct displaying of this content and refresh this page.