Trojan.Vundo

Printer Friendly Page

Discovered: November 20, 2004
Updated: August 09, 2012 2:30:01 PM
Type: Trojan
Infection Length: Varies
Systems Affected: Windows

Trojan.Vundo is a Trojan horse that downloads files and displays pop-up advertisements. It is known to be distributed through spam email, peer-to-peer file sharing, drive-by downloads, and by other malware.

Infection
Trojan.Vundo, also known as VirtuMonde, VirtuMundo, and MS Juan, typically arrives by way of spam email or is hoisted onto the user’s computer by a drive-by download that exploits a browser vulnerability. The Trojan may also be downloaded via file-sharing networks, with the malicious executables having been given innocuous names to trick users into running them.

Trojan.Vundo may also be downloaded by other malware. The mass-mailing worms W32.Ackantta.B@mm and W32.Ackantta.C@mm are known to download variants of this threat family on to compromised computers. Increased levels of infection of these worms has been seen to result in an increase in the number of Trojan.Vundo infections.

Functionality
Trojan.Vundo was designed as a means for displaying advertisements on the compromised computer. The Trojan includes functionality to display pop-ups and is additionally capable of injecting advertisements into search results.

The advertisements and pop-ups that are displayed include those for fraudulent or misleading applications; intrusive pop-ups, fake scan results, and so-called alerts that masquerade as being from legitimate security software appear on the desktops of compromised computers in an attempt to frighten users into clicking buttons for 'further information'. The advertisements generally link to sites offering non-functional (or occasionally outright harmful) programs that purport to be capable of ridding the computer of non-existent malware in return for a fee payable by credit card.

Advertisements for adult Web sites and services may also be displayed by the threat.

In order to make it more difficult to remove, Trojan.Vundo also lowers security settings, prevents access to certain Web sites, and disables certain system software. Some variants attempt to disable antivirus programs.

Recent Trojan.Vundo variants have more sophisticated features and payloads, including rootkit functionality, the capability to download misleading applications by exploiting local vulnerabilities, and extensions that encrypt files in order to extort money from the user.

GEOGRAPHICAL DISTRIBUTION
Symantec has observed the following geographic distribution of this threat.



PREVALANCE
Symantec has observed the following following infection levels of this threat worldwide.



SYMANTEC PROTECTION SUMMARY
The following content is provided by Symantec to protect against this threat family.

Antivirus signatures


Antivirus (heuristic/generic)

    Browser protection

    Symantec Browser Protection is known to be effective at preventing some infection attempts made through the Web browser.

    Intrusion Prevention System

    Antivirus Protection Dates

    • Initial Rapid Release version May 09, 2006
    • Latest Rapid Release version April 18, 2018 revision 020
    • Initial Daily Certified version May 09, 2006
    • Latest Daily Certified version April 18, 2018 revision 025
    • Initial Weekly Certified release date May 10, 2006

    Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

    Writeup By: Henry Bell and Eric Chien

    Discovered: November 20, 2004
    Updated: August 09, 2012 2:30:01 PM
    Type: Trojan
    Infection Length: Varies
    Systems Affected: Windows

    1. Prevention and avoidance
    1.1 User behavior and precautions
    1.2 Operating system and software patches
    2. Infection method
    2.1 Email
    2.2 Other malware
    2.3 Peer-to-peer file-sharing
    2.4 Drive-by downloads
    2.5 Fake codecs
    3. Functionality
    3.1 Display of advertisements
    3.2 Pop-up and pop-under advertising
    3.3 JavaScript injection
    3.4 Modification of search results
    3.5 Web browser monitoring
    3.6 Disabling of system and security software
    3.7 User interface changes
    3.8 System modifications
    3.9 Network activity
    4. Additional information



    1. PREVENTION AND AVOIDANCE

    The following actions can be taken to avoid or minimize the risk from this threat.


    1.1 User behavior and precautions
    Users should be aware that email messages with malicious content may appear to have been sent by people known to them, and as such the fact that the sender is known does not guarantee the safety of any particular message.

    Spam emails may contain malicious links that have been disguised or otherwise made to appear benign. Users should exercise caution when following links in email messages, especially if:

    • The sender is not known, or
    • Given the sender, the characteristics of the email are unusual, or
    • The link is to an unknown domain or an executable file

    Users should avoid opening email attachments unless their authenticity can be verified.

    The downloading of files via peer-to-peer file-sharing networks can lead to infection. Users should avoid downloading files from unknown or untrusted sources, including fake video Web sites that may serve the Trojan executable under guise of it being a codec that is required to watch a streaming video.


    1.2 Operating system and software patches
    Users are advised to ensure that their operating systems and installed software are fully patched, and that antivirus and firewall software is up to date and operational. Users should turn on automatic updates if available so that their computers can receive the latest patches and updates when they are distributed by software vendors.



    2. INFECTION METHOD
    This threat is known to infect computers through a number of methods. Each of these methods is examined in more detail below.


    2.1 Email
    As with most spam email, the campaigns that spread Trojan.Vundo generally attempt to entice or coerce the user into running an attached file, or clicking on a link to a malicious file. A malicious URL may also lead to a browser exploit that results in the malicious file being executed. This may be done by crafting file names or URLs to appear safe or to resemble those from sources trusted by the user.

    Malicious executable files may be attached to emails with innocuous or enticing names, be compressed within .zip files, and may also have file names that have been specially crafted in order to make the executable appear to be a different type of file.




    2.2 Other malware
    As Trojan.Vundo allows attackers to generate revenue from compromised computers, it is often downloaded by other malware. The Ackantta family of mass-mailing worms – including W32.Ackantta.B@mm and W32.Ackantta.C@mm – typically downloads Trojan.Vundo on to compromised computers using HTTP and therefore significantly contributes to infection levels of the threat.


    2.3 Peer-to-peer file-sharing
    Trojan.Vundo spreads via peer-to-peer file sharing networks. The Trojan may deliberately be shared by attackers seeking to increase the infection levels of the threat, and as such may be given an enticing name in order to tempt users into downloading the malicious executable. Typical enticing names include those of otherwise expensive commercial software packages, key generators, and 'cracked' versions of high-end applications. Copies of the threat masquerading as adult pictures and video files are also common, especially those that include the names of celebrities intended to pique users' interest.


    2.4 Drive-by downloads
    Trojan.Vundo is known to be spread by Web sites that exploit known vulnerabilities in Web browsers and their associated plugins. These exploits are often served by commercially available exploit kits and as such need not necessarily be crafted by individuals with a high degree of technical ability. This also means that the vulnerabilities chosen to be exploited change frequently and according to ease of exploitation.


    2.5 Fake codecs
    Web sites that purport to host streaming videos may be used to distribute copies of the Trojan. An executable masquerading as a required codec is downloaded when a user attempts to watch the deliberately non-functional embedded video. Search engine poisoning may be used to increase the likelihood of users finding the fraudulent site when using search engines; particularly newsworthy or currently trending topics are often chosen by attackers, seemingly without any moral concern.





    3. FUNCTIONALITY

    Trojan.Vundo consists of three main DLLs:
    • A DLL to download files
    • A DLL to lower security settings
    • A DLL to monitor Web browsing and display advertisements (i.e. the Trojan’s payload)

    Each of these DLLs is capable of functioning independently on the compromised computer.

    The first Trojan.Vundo component, the downloader DLL, typically arrives on the computer by way of an initial dropper executable. When executed, the downloader component then downloads the other two component DLLs on to the compromised computer, which it then executes. The DLL containing the Trojan’s payload is then injected into all running processes, including Web browsers.

    Depending on the variant, the downloader DLL component may also download other files, such as misleading applications or copies of other malware.


    3.1 Display of advertisements
    The primary aim of Trojan.Vundo is to display advertisements on the compromised computer. This aim is accomplished through several different methods:
    • Displaying pop-up and pop-under advertisements
    • Injecting JavaScript into HTML pages viewed on the compromised computer
    • Altering links returned by search engines


    3.2 Pop-up and pop-under advertising
    The Trojan displays both pop-up and pop-under advertising, typically for fraudulent or misleading applications and adult Web sites.



    Clicking the pop-ups results in further fake scans. Web browsers may also be redirected to potentially malicious Web sites.


    3.3 JavaScript injection
    Along with the main pop-up advertising functionality detailed above, Trojan.Vundo also injects JavaScript into the HTML of search result pages returned by the following search engines:
    • AltaVista
    • AOL Search
    • Ask
    • Bing
    • FastSearch
    • Google
    • Hotbot
    • Live
    • Lycos
    • Yahoo

    The JavaScript injected by the Trojan causes further pop-up advertisements to be displayed on the compromised computer.


    3.4 Modification of search results
    Trojan.Vundo is additionally able to modify search results returned by the search engines mentioned above. The Trojan analyzes the HTML of search result pages and inserts its own HTML links in place of the links in the original pages. This causes users to be redirected to sites they would otherwise not have accessed. The pages to which users may be redirected include adult and pornographic sites, sites advertising misleading applications, fake security scans, and pages advertising various other products and services.


    3.5 Web browser monitoring
    Trojan.Vundo monitors Web browsing on the compromised computer and relays the URLs visited to a remote location using HTTP post operations. It also sends other system information, including the following:
    • System information
    • Affiliate IDs for advertising and pay-per-install software
    • Browser name



    Note: The HTTP post data is encoded using base64.


    3.6 Disabling of system and security software
    In order to impede manual removal and prolong its presence on the compromised computer, Trojan.Vundo may create or modify certain registry entries to disable system tools that may be used to rid the computer of the threat. The modifications include (but are not limited to) the following:
    • Disabling the Task Manager, Registry Editor, and the Microsoft System Configuration Utility
    • Preventing Windows Automatic Updates
    • Altering Safe Mode settings
    • Disabling antivirus software, including Windows Defender
    • Blocking antivirus software updates


    3.7 User interface changes
    The Trojan may alter Explorer settings that affect the way in which the user is able to interact with the compromised computer. It may, for example, alter the Desktop wallpaper, the screensaver, and the items that are displayed in the Windows Control Panel Display settings.


    3.8 System modifications

    Files/folders created
    Trojan.Vundo consists of three DLLs named randomly as follows:

    [RANDOM CHARACTERS].dll

    The DLLs that comprise the Trojan have been observed in the following folders:
    • %Windir%
    • %Windir%\addins
    • %Windir%\AppPatch
    • %Windir%\assembly
    • %Windir%\Config
    • %Windir%\Cursors
    • %Windir%\Driver Cache
    • %Windir%\Drivers
    • %Windir%\Fonts
    • %Windir%\Help
    • %Windir%\inf
    • %Windir%\java
    • %Windir%\Microsoft
    • %Windir%\Microsoft.NET
    • %Windir%\msagent
    • %Windir%\Registration
    • %Windir%\repair
    • %Windir%\security
    • %Windir%\ServicePackFiles
    • %Windir%\Speech
    • %Windir%\system
    • %Windir%\system32
    • %Windir%\Tasks
    • %Windir%\Web
    • %Windir%\Windows Update Setup Files

    Files/folders deleted
    None

    Files/folders modified
    None

    Registry subkeys/entries created
    • HKEY_CLASSES_ROOT\CLSID\[RANDOM CLSID]\InprocServer32\"" = "[PATH TO THREAT]\[RANDOM CHARACTERS].dll"
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\"[RANDOM CLSID]" = "[NINE CHARACTERS]"
    • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\"[NINE CHARACTERS]" = "Rundll32.exe "[PATH TO THREAT]\[RANDOM CHARACTERS].dll",a."
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\"[NINE CHARACTERS]" = "[RANDOM CLSID]"

    Note: [NINE CHARACTERS] is generated from the serial number of %SystemDrive%.

    Registry subkeys/entries deleted
    None

    Registry subkeys/entries modified
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\"AppInit_DLLs" = "[PATH TO THREAT]\[RANDOM CHARACTERS].dll"
    • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\"LoadAppInit_DLLs" = "4"

    Note: [NINE CHARACTERS] is generated from the serial number of %SystemDrive%.


    3.9 Network activity
    The threat may perform the following network activities.

    Downloading
    The Trojan may download and execute additional malicious executables.

    Uploading
    None

    Other network activity
    Trojan.Vundo monitors Web browsing on the compromised computer. Each time a URL is visited, the Trojan performs a base-64-encoded HTTP post operation that contains the following information:
    • System information
    • Affiliate IDs for advertising and pay-per-install software
    • Browser name
    • URL visited

    This information allows the threat to target the advertisements more specifically to the user.



    4. ADDITIONAL INFORMATION
    For more information relating to this threat family, please see the following resources:

    Recommendations

    Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

    • Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.
    • Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
    • Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.
    • Disable AutoPlay to prevent the automatic launching of executable files on network and removable drives, and disconnect the drives when not required. If write access is not required, enable read-only mode if the option is available.
    • Turn off file sharing if not needed. If file sharing is required, use ACLs and password protection to limit access. Disable anonymous access to shared folders. Grant access only to user accounts with strong passwords to folders that must be shared.
    • Turn off and remove unnecessary services. By default, many operating systems install auxiliary services that are not critical. These services are avenues of attack. If they are removed, threats have less avenues of attack.
    • If a threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
    • Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
    • Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats, such as .vbs, .bat, .exe, .pif and .scr files.
    • Isolate compromised computers quickly to prevent threats from spreading further. Perform a forensic analysis and restore the computers using trusted media.
    • Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
    • If Bluetooth is not required for mobile devices, it should be turned off. If you require its use, ensure that the device's visibility is set to "Hidden" so that it cannot be scanned by other Bluetooth devices. If device pairing must be used, ensure that all devices are set to "Unauthorized", requiring authorization for each connection request. Do not accept applications that are unsigned or sent from unknown sources.
    • For further information on the terms used in this document, please refer to the Security Response glossary.

    Writeup By: Henry Bell and Eric Chien

    Discovered: November 20, 2004
    Updated: August 09, 2012 2:30:01 PM
    Type: Trojan
    Infection Length: Varies
    Systems Affected: Windows

    You may have arrived at this page either because you have been alerted by your Symantec product about this risk, or you are concerned that your computer has been affected by this risk.

    Before proceeding further we recommend that you run a full system scan . If that does not resolve the problem you can try one of the options available below.



    FOR NORTON USERS
    If you are a Norton product user, we recommend you try the following resources to remove this risk.

    Removal Tool


    If you have an infected Windows system file, you may need to replace them using from the Windows installation CD .


    How to reduce the risk of infection
    The following resources provide further information and best practices to help reduce the risk of infection.


    FOR BUSINESS USERS
    If you are a Symantec business product user, we recommend you try the following resources to remove this risk.

    Identifying and submitting suspect files
    Submitting suspicious files to Symantec allows us to ensure that our protection capabilities keep up with the ever-changing threat landscape. Submitted files are analyzed by Symantec Security Response and, where necessary, updated definitions are immediately distributed through LiveUpdate™ to all Symantec end points. This ensures that other computers nearby are protected from attack. The following resources may help in identifying suspicious files for submission to Symantec.


    Removal Tool

    If you have an infected Windows system file, you may need to replace them using from the Windows installation CD .


    How to reduce the risk of infection
    The following resource provides further information and best practices to help reduce the risk of infection.
    Protecting your business network



    MANUAL REMOVAL
    The following instructions pertain to all current Symantec antivirus products.

    1. Performing a full system scan
    How to run a full system scan using your Symantec product


    2. Restoring settings in the registry
    Many risks make modifications to the registry, which could impact the functionality or performance of the compromised computer. While many of these modifications can be restored through various Windows components, it may be necessary to edit the registry. See in the Technical Details of this writeup for information about which registry keys were created or modified. Delete registry subkeys and entries created by the risk and return all modified registry entries to their previous values.

    Writeup By: Henry Bell and Eric Chien