Inside the Jaws of Trojan.Clampi
It’s well known that malware is growing more sophisticated, but few threats have had us scratching our heads like Trojan.Clampi. In order to remove the mystery around this threat, Security Response will be publishing a series of blogs talking about various aspects of Clampi. As an introduction, we’d like to present a brief overview of the threat.
Trojan.Clampi has been around for a number of years now. During this time it has gone through many iterations, changing its code with a view to avoid detection and also to make it difficult for researchers to analyze.
From our analysis it seems that Clampi has mainly affected machines in the US. Clampi infection rates seem to be skewed towards countries where English is the primary language. This may indicate the first infections were as a result of malicious drive-by attacks on English websites. The top 5 rates of new infections over the last two weeks are:
- Great Britain
- New Zealand
The following graph shows the trend in Clampi detections over the last year. There are two notable spikes which correspond to the release of updates to this Trojan. The variant released on July 15, 2009 is what we are currently seeing in the wild.
The next graph shows the geographical distribution of this threat over the last two weeks:
Clampi uses a commercial utility to help prevent analysis of its code. This utility is supposed to be used to protect intellectual property by making it extremely difficult to analyze and subsequently crack copyrighted software. The techniques used to prevent analysis include:
Executable code virtualization (built-in virtual machine)
The combination of these techniques makes it very difficult and time consuming to get at the underlying code to see exactly what the code is doing. This also makes it difficult to create detection for malware protected in this way. Symantec products detect all known variants as either Trojan.Clampi or Trojan.Clampi!gen. The first sets of definitions to detect these were:
Functionally, Clampi appears to be quite versatile. It has the capability to download arbitrary binaries that are then stored in the registry and loaded straight to memory, avoiding traditional antivirus scanning techniques that scan files on disk. It remains active on the network, connecting back to a server and waiting for commands. Clampi also has the ability to spread to other machines on the network through network shares—this feature is the reason we are seeing such widespread infections.
As the layers of protection are peeled away we gain more insight into what this threat is doing and what it is capable of. The analysis also raises more questions but one thing remains clear—this is a very interesting threat. We hope you’ll enjoy the coming articles which will explore this threat.