Threat Database Trojans Trojan:Win32/Sefnit.AU

Trojan:Win32/Sefnit.AU

By ZulaZuza in Trojans

Threat Scorecard

Threat Level: 90 % (High)
Infected Computers: 1
First Seen: September 25, 2013
Last Seen: October 17, 2019
OS(es) Affected: Windows

The Trojan:Win32/Sefnit.AU Trojan is one of the many Trojans that are involved in malware attacks by the SEFNIT family of malware. The Trojan:Win32/Sefnit.AU, a variant of this family may act as a Trojan downloader or installer, establishing the initial backdoor on the victim's computer and establishing an unauthorized connection with a remote server and downloading other threats and other members of the Trojan:Win32/Sefnit.AU family, such as Trojan:Win32/Sefnit.AT and Trojan:Win32/Sefnit.gen!D, which carry out other variants in this attack. Trojan:Win32/Sefnit.AU takes advantage of social engineering scams carried out through file sharing networks, in particular the eMule file sharing application. Other Trojan:Win32/Sefnit.AU distribution methods include social engineering, the installation of several threats and PUPs and spam email messages.

How Trojan:Win32/Sefnit.AU is Acquired

Trojan:Win32/Sefnit.AU and other threats in this family of Trojans may be bundled with legitimate programs downloaded from poorly guarded sources. There are various unsafe executable files that are disguised as other installers but that install the Trojan:Win32/Sefnit.AU instead. Some examples include the following:

  • FlashPlayerUpdateService.exe.
  • BleServicesCtrl.exe.
  • Wins.exe.
  • TrustedInstaller.exe.

All of the above are names of legitimate Windows services that have been co-opted by the Trojan:Win32/Sefnit.AU infection to carry out its attack and conceal its true nature. The Trojan:Win32/Sefnit.AU infection is usually part of click fraud schemes that generate revenue at the expense of the computer user. Some Trojan:Win32/Sefnit.AU variants may establish a proxy service (that is from a legitimate source) named 3proxy.

Trojan:Win32/Sefnit.AU Payload is Meant to Cause More Problems

The main purpose of Trojan:Win32/Sefnit.AU is to download other threats. Trojan:Win32/Sefnit.AU establishes an unauthorized connection with its Command and Control servers to download the other threats. Trojan:Win32/Sefnit.AU may establish both HTTP and security connections and, in the case of some variants, may even use Tor to establish its connection. As mentioned above, the main purpose of malware in the Sefnit family is to carry out click fraud. This means that Trojan:Win32/Sefnit.AU uses the victim's computer to click on affiliate marketing links and advertisements in order to generate advertisement and affiliate marketing revenue. One of the reasons why Trojan:Win32/Sefnit.AU uses 3proxy is to make it seems as if various different computers are clicking on the same link.

File System Details

Trojan:Win32/Sefnit.AU may create the following file(s):
# File Name Detections
1. FlashPlayerUpdateService.exe
2. http://kimberlybroher.no-ip.biz/[removed]/tc.c1
3. http://jameslipon.no-ip.biz/[removed]/tc.c1
4. %windir% \Tasks\AdobeFlashPlayerUpdate 2.job
5. http://patricevaillancourt.sytes.net/[removed]/tc.c1
6. %windir% \Tasks\AdobeFlashPlayerUpdate.job
7. http://timothymahoney.ddns.me.uk/[removed]/tc.c1
8. http://olivasonny.no-ip.biz/[removed]/tc.c1

Registry Details

Trojan:Win32/Sefnit.AU may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc\Enum "0" = "Root\LEGACY_ADOBEFLASHPLAYERUPDATESVC\0000"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "ImagePath" = "
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "Description" = "This service keeps your Adobe Flash Player installation up to date with the latest enhancements and security fixes."
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc\Enum "NextInstance" = "0x00000001"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "Type" = "0x00000020"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "ObjectName" = "LocalSystem"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "DisplayName" = "Adobe Flash Player Update Service"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc\Enum "Count" = "0x00000001"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc\Security "Security" = "01 00 14 80 90 00 00 00 9C 00 00 00 14 00 00 00 30 00 00 00 02 00 1C 00 01 00 00 00 02 80 14 00 FF 01 0F 00 01 01 00 00 00 00 00 01 00 00 00 00 02 00 60
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "ErrorControl" = "0x00000001"folder>\Macromed\Flash\FlashPlayerUpdateService.exe"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\AdobeFlashPlayerUpdateSvc "FailureActions" = "FF FF FF FF 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 30 75 00 00"

URLs

Trojan:Win32/Sefnit.AU may call the following URLs:

http://updsvc.net/[removed]/3f76764a34f81e63df90b61f65b31d75/2
srvupd.com
srvupd.net
svcupd.net
updsrv.net
updsvc.com
updsvc.net

Trending

Most Viewed

Loading...