Follow:

 

TrojanSpy:Win32/Sticamint.A


TrojanSpy:Win32/Sticamint.A is a trojan that collects sensitive information for an attacker.


What to do now

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.

Threat behavior

TrojanSpy:Win32/Sticamint.A is a trojan that collects sensitive information for an attacker.
Installation
TrojanSpy:Win32/Sticamint.A creates the following files on an affected computer:

  • %programfiles%\docmentt\khehs.exe
  • c:\savetxta71566.txt
  • c:\documents and settings\administrator\local settings\temp\24869735.gif
  • c:\documents and settings\administrator\local settings\temp\e.tmp
  • c:\documents and settings\administrator\local settings\temp\rarsfx0\2222.exe - detected as TrojanSpy:Win32/Sticamint.A
  • c:\documents and settings\administrator\local settings\temp\rarsfx0\40.exe - detected as Trojan:Win32/Danglo
  • c:\documents and settings\administrator\local settings\temp\rarsfx0\opplayw222.exe
  • c:\documents and settings\administrator\local settings\temp\rarsfx0\pplive7039.exe
  • c:\documents and settings\administrator\local settings\temp\rarsfx0\xx85.exe
  • c:\documents and settings\all users\application data\{41de573e-4fd2-4cb9-00b2-3face6637d01}\aof4879.lex
Payload
Contacts remote hosts
TrojanSpy:Win32/Sticamint.A may contact the following remote hosts using port 80:

  • 424716.154367508.cn
  • rpt2.21civ.com
  • www.wdwg.net

Commonly, malware may contact a remote host for the following purposes:
  • To confirm Internet connectivity
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 439863bf67f0c3aad6571e6ccb394507f58745e0.

Symptoms

System changes
The following system changes may indicate the presence of this malware:

  • The presence of the following files:
  • %programfiles%\docmentt\khehs.exe
    c:\savetxta71566.txt
    c:\documents and settings\administrator\local settings\temp\24869735.gif
    c:\documents and settings\administrator\local settings\temp\e.tmp
    c:\documents and settings\administrator\local settings\temp\rarsfx0\2222.exe
    c:\documents and settings\administrator\local settings\temp\rarsfx0\40.exe
    c:\documents and settings\administrator\local settings\temp\rarsfx0\opplayw222.exe
    c:\documents and settings\administrator\local settings\temp\rarsfx0\pplive7039.exe
    c:\documents and settings\administrator\local settings\temp\rarsfx0\xx85.exe
    c:\documents and settings\all users\application data\{41de573e-4fd2-4cb9-00b2-3face6637d01}\aof4879.lex


Prevention


Alert level: Severe
First detected by definition: 1.85.1058.0
Latest detected by definition: 1.173.2181.0 and higher
First detected on: Jun 29, 2010
This entry was first published on: Aug 25, 2010
This entry was updated on: Apr 17, 2011

This threat is also detected as:
  • Mal_DLDER (Trend Micro)
  • Trojan.Win32.VB.aiap (Kaspersky)
  • Sus/Behav-113 (Sophos)