Threat Database Trojans Trojan.Downloader.Vundo.J

Trojan.Downloader.Vundo.J

By CagedTech in Trojans

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 14
First Seen: October 8, 2012
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda Trj/OCJ.C
AVG Generic31.ADN
Fortinet W32/Cidox.URQ!tr
Kaspersky Trojan.Win32.Cidox.urq
Panda Trj/OCJ.D
AVG Generic31.BNWS
Fortinet W32/Cidox.ACCN!tr
AntiVir TR/Kazy.117219.77
Kaspersky Trojan.Win32.Cidox.accn
eSafe Win32.Trojan
Avast Win32:Kryptik-LDO [Trj]
F-Prot W32/Downldr2.IZIW
K7AntiVirus Trojan
McAfee RDN/Downloader.a!bq
CAT-QuickHeal Trojan.Agent.WD.cw6

SpyHunter Detects & Remove Trojan.Downloader.Vundo.J

File System Details

Trojan.Downloader.Vundo.J may create the following file(s):
# File Name MD5 Detections
1. tpnvnmb.dll f65838a463202fc9b16526a1c31c8baf 3
2. vaymcyl.dll a7add8058dde29973cb8bb4a34b1c539 2
3. yxsuzlc.dll 63b34123956a443f636771ede53f98e0 2
4. 773A.exe 1a4e970d540476f50b42dd09cc3d2e56 1
5. pbyhmkd.dll 3c00bc0343dc19c6f0a152d039bc2e8b 1
6. tuitjel.dll e5e25ec02821506208ffd136819659f2 1
7. xnwpwmk.dll 719fef63b54f4fbf8d7ce142f85aa0c0 1
8. ctivkuf.dll eab0ec6acb884318019e8e0008ff263c 1
9. ygkpqbd.dll 64de0bc33d25e1e32580a1d298d3ef27 1

Analysis Report

General information

Family Name: Trojan.Vundo.J
Signature status: No Signature

Known Samples

MD5: 4b4ed4f2b9edf92a6d64c0a7f40c3e09
SHA1: 15ec737eee7afeeb14997338c7d6590c5c84b0d7
SHA256: D611D03C6A1F97BB96B1C66E99710993B48A9426D2DFDAC00AFA09A05DE7B988
File Size: 37.89 KB, 37888 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • 2+ executable sections
  • dll
  • ntdll
  • VirtualQueryEx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 71
Potentially Malicious Blocks: 63
Whitelisted Blocks: 5
Unknown Blocks: 3

Visual Map

x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x ? x x x x x ? x x x ? x x x x x x x x x x x 0 x 0 x x x x x 0 0 x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Vundo.J

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\15ec737eee7afeeb14997338c7d6590c5c84b0d7_0000037888.,LiQMAxHB

Trending

Most Viewed

Loading...