MSIL/Spy.Agent.AKO [Threat Name] go to Threat
MSIL/Spy.Agent.AKO [Threat Variant Name]
Category | trojan |
Size | 887808 B |
Aliases | Trojan.Win32.Droma.zek (Kaspersky) |
TrojanSpy:Win32/Skeeyah.A!rfn (Microsoft) | |
PSW.MSIL.AZPI.trojan (AVG) | |
TR/Dropper.MSIL.nmcn (Avira) |
Short description
MSIL/Spy.Agent.AKO is a trojan that steals passwords and other sensitive information. The trojan attempts to send gathered information to a remote machine.
Installation
When executed, the trojan copies itself in some of the the following locations:
- %appdata%\%variable1%\%variable2%
- %localappdata%\%variable1%\%variable2%
- %personal%\%variable1%\%variable2%
- %temp%\%variable1%\%variable2%
In order to be executed on every system start, the trojan sets the following Registry entries:
- [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "%variable3%" = "%malwarefilepath%"
- [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
- "%variable4%" = "%malwarefilepath%"
The trojan may create the following files:
- %temp%\EBFile_%variable5%
- %temp%\BFile_%variable6%
A string with variable content is used instead of %variable1-6% .
The files are then executed.
The trojan launches the following processes:
- %windir%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "%appdata%\Helper\Browser.txt"
- %windir%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "%appdata%\Helper\Mail.txt"
- %windir%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "%appdata%\Helper\Mess.txt"
- %windir%\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "%appdata%\Helper\OS.txt"
The trojan creates and runs a new thread with its own code within these running processes.
The trojan quits immediately if any of the following applications is detected:
- Sandboxie
- Wireshark
- Winsock Packet Editor (WPE) Pro
After the installation is complete, the trojan deletes the original executable file.
Information stealing
The trojan collects the following information:
- login user names for certain applications/services
- login passwords for certain applications/services
- user name
- computer name
- operating system version
- language settings
- installed firewall application
- installed antivirus software
- default Internet browser
The following programs are affected:
- Beyluxe Messenger
- CoreFTP
- Eudora
- Exchange Server
- FileZilla
- Google Chrome
- Group Mail Free
- IncrediMail
- Internet Explorer
- Live Messenger
- Microsoft Office
- Microsoft Outlook
- Minecraft
- Mozilla Firefox
- Mozilla Thunderbird
- Netscape
- Opera
- Outlook Express
- Runescape
- Safari
- SQL Server
- Windows
- Windows Live Mail
- Windows Mail
- Windows Messenger
- Yahoo! Mail
It can execute the following operations:
- log keystrokes
- capture screenshots
- capture webcam picture
The trojan attempts to send gathered information to a remote machine.
The FTP, HTTP protocol or e-mail is used.
Other information
It can execute the following operations:
- download files from a remote computer and/or the Internet
- run executable files
- display a dialog window
- open a specific URL address
- terminate running processes
- block access to specific websites
- send gathered information
The trojan can modify the following file:
- %system%\drivers\etc\hosts
The trojan may delete the following files:
- %appdata%\.minecraft\lastlogin
- %localappdata%\Google\Chrome\User Data\Default\Login Data
- %localappdata%\Google\Chrome\User Data\Default\Web Data
- %localappdata%\Google\Chrome\User Data\Default\Cookies
- %localappdata%\Google\Chrome\User Data\Default\History
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\Login Data
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\signons.txt
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\signons2.txt
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\signons3.txt
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\signons.sqlite
- %appdata%\Mozilla\Firefox\Profiles\%defaultprofile%\key3.db
The trojan may set the following Registry entries:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
- "DisableTaskMgr" = "1"
- "DisableCMD" = "1
- "DisableRegistryTools" = "1"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avconfig.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avscan.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\instup.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbam.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamgui.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbampt.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamscheduler.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mbamservice.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hijackthis.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\spybotsd.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccuac.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avcenter.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avguard.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgnt.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgui.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgcsrvx.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgidsagent.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrsx.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgwdsvc.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zlclient.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bdagent.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\keyscrambler.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wireshark.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ComboFix.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe]
- "Debugger" = "rundll32.exe"
- [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe]
- "Debugger" = "rundll32.exe"
The modified Registry entries will prevent specific files from being executed.
The trojan may execute the following commands:
- cmd.exe /C TASKKILL /F /IM wscript.exe
- cmd.exe /C TASKKILL /F /IM cmd.exe
Trojan requires the Microsoft .NET Framework to run.