Win32/Spy.Buhtrap [Threat Name] go to Threat
Win32/Spy.Buhtrap.L [Threat Variant Name]
Category | trojan |
Size | 267224 B |
Aliases | TrojanProxy:Win32/Chrofprox (Microsoft) |
Trojan.Proxy2.434 (Dr.Web) |
Short description
Win32/Spy.Buhtrap.L is a trojan that steals passwords and other sensitive information.
Installation
When executed, the trojan creates the following files:
- %appdata%\Red Media Player\LICENSE (16198 B)
- %appdata%\Red Media Player\bin\config.model.xml (4780 B)
- %appdata%\Red Media Player\bin\contextMenu.xml (3459 B)
- %appdata%\Red Media Player\bin\functionList.xml (12337 B)
- %appdata%\Red Media Player\bin\isbzip.dll (32976 B)
- %appdata%\Red Media Player\bin\isunzlib.dll (23248 B)
- %appdata%\Red Media Player\bin\msvcr71.dll (142544 B, Win32/Spy.Buhtrap.L)
- %appdata%\Red Media Player\bin\rmp.exe (12496 B, Win32/Spy.Buhtrap.L)
- %appdata%\Red Media Player\bin\zlib.exe (85712 B, Win32/Spy.Buhtrap.L)
- %appdata%\Red Media Player\change.log (450 B)
- %appdata%\Red Media Player\localization\english.xml (54633 B)
- %appdata%\Red Media Player\localization\russian.xml (9350 B)
- %appdata%\Red Media Player\readme.txt (1449 B)
- %appdata%\Microsoft\Windows\Start Menu\Red Media Player.lnk (1090 B)
In order to be executed on every system start, the trojan sets the following Registry entry:
- [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]
- "Red Media Player" = "%appdata%\Red Media Player\bin\rmp.exe"
The trojan creates the following files:
- %appdata%\Microsoft\Windows\Start Menu\Programs\Startup\Red Media Player.lnk
The file is a shortcut to a following file:
- %appdata%\Red Media Player\bin\rmp.exe
This way the trojan ensures that the file is executed on every system start.
Information stealing
Win32/Spy.Buhtrap.L is a trojan that steals passwords and other sensitive information.
The following information is collected:
- operating system version
- hardware information
- list of running processes
- data from the clipboard
- logged keystrokes
The trojan gathers sensitive information from processes which contain any of the following strings in their path:
- *\Skype.exe
- *\WINWORD.EXE
- *\1cv8.exe
- *\1cv7s.exe
- *\1cv7.exe
- *\EXCEL.EXE
- *\msimn.exe
- *\thunderbird.exe
- *\sbis.exe
- *\OUTLOOK.EXE
The collected information is stored in the following files:
- %appdata%\adobesystem.log
- %appdata%\ntuser.dat
Other information
The trojan contains a URL address. The trojan may attempt to download files from the Internet.
The file is stored in the following location:
- %temp%\%variable%
A string with variable content is used instead of %variable% .
The file is then executed. The HTTP protocol is used in the communication.