Computer threads and malicious software description
Agent.REK
2013-02-10
Aliases: Trojan-Dropper.Win32.Agent.rek
Category: Malware
Parameters: Size: 39,424; Type: Trojan-Dropper; Platform: W32
Short description
Agent.REK drops and starts additional malware on the infected system.
Long description
When started, Agent.REK drops and starts the following files:
%System%\WinNt32.dll
%System%\drivers\[random name].sys
Note: %System% usually represents C:\Windows\System32.
Note: [random name] represents a randomly generated name of file used by the Trojan during the infection as Oiv23.sys and Tqy10.sys.
The dropped files are recognized as Trojan-Downloader.Win32.Agent.GLH and Trojan-Dropper.Win32.Agent.REK.
This Trojan creates the following records in the registry as a part of its installation:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinNt32
DLLName = "WinNt32.dll"
StartShell = WLEventStartShell
HKLM\SYSTEM\CurrentControlSet\Services\[random filename]
ImagePath = "%System%\drivers\[random filename]
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\[random filename].sys (default) = Driver
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\[random filename].sys (default) = Driver
After that Trojan-Downloader.Win32.Agent.GLH is trying to connect to the following IP addresses:
208.66.195.15
217.170.77.146
66.232.113.80