Trojan:Win32/Vundo.gen!BY is a generic detection for members of the Win32/Vundo family, a multi-component family that delivers 'out-of-context pop-up advertisements'. Trojan:Win32/Vundo.gen!BY has also been observed modifying and redirecting search engine results on specified web browsers.
Installation
Trojan:Win32/Vundo.gen!BY may be installed by other malware; in the wild, we have observed the trojan being dropped by TrojanDownloader:Win32/Vundo.K.
It arrives on the computer as a DLL file that is dropped in the <system folder> with a random file name.
Note: <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.
The malware file name is disguised to be the same as a legitimate DLL and can be any of the following:
- mapiclient.dll
- imapiapi.dll
- themespl.dll
- commgr20.dll
Trojan:Win32/Vundo.gen!BY modifies the following registry entries to ensure that its copy executes at each Windows start:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "<system folder>\<malware file name>"
With data: "<system folder><malware file name>.dll"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Sets value: "LoadAppInit_DLLs"
With data: 0x00000001
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Sets value: "AppInit_DLLs"
With data: "<malware file name>.dll"
It also injects itself into the following Windows processes:
- explorer.exe
- iexplorer.exe
- chrome.exe
- firefox.exe
Payload
Redirects search queries
Trojan:Win32/Vundo.gen!BY hooks on networking APIs which allows it to monitor websites the affected user accesses.
It may display advertisements from, and perform web search redirection to, the following websites:
- lastserverstatus <dot> com
- avatar3d2010 <dot> com
- searchetype <dot> com
- win32updater <dot> com
- vistanumbers <dot> com
- updatedfiles <dot> com
- win7updater <dot> com
- try2findall <dot> com
- victsecrets <dot> com
Displays pop-up advertisements
The trojan may display pop-up advertisements in the following browsers:
- Internet Explorer
- Firefox
- Opera
Downloads arbitrary files
Trojan:Win32/Vundo.gen!BY attempts to download and execute files from the following web servers to the infected computer:
- updatedfiles.com/ myspace/out/<arbitrary file>
- abcchecksystem.com/ipo/out/<arbitrary file>
Analysis by Zarestel Ferrer