Defend what you create

Other Resources

Close

Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Back to news

Trojan clicker distributed under the guise of DynDNS

November 23, 2018

Typically, cybercriminals use several traditional malware distribution channels, the main one being spamming. However, occasionally one comes across other means of distribution. Doctor Web’s experts will touch on one of them in this article.

By itself, Trojan.Click3.27430 is of no particular interest; it is a regular Trojan clicker that artificially increases website traffic. What is much more interesting is the method attackers use to install the malware on the devices of their potential victims.

The Trojan targets users of DynDNS software, which allows a subdomain to be bound to a computer that has no static IP address. The virus writer created a dnsip.ru webpage from which this program can allegedly be downloaded for free. The virus writer also owns the dns-free.com domain, and it automatically redirects visitors to dnsip.ru.

screenshot Trojan.Click3.27430 #drweb

The website does indeed make an archive available for download. The archive contains the executable file setup.exe, which in reality is not a DynDNS installer, but a downloader. It stores the name of the file downloaded from the Internet; in our sample this was Setup100.arj.

Despite the telltale extension, Setup100.arj is not an ARJ archive, but an executable MZPE file that has had three of its values modified so that it is not recognized as MZPE by automated analysis tools and other applications.

screenshot Trojan.Click3.27430 #drweb

First, it uses PowerShell to disable Windows Defender, and, for greater reliability, it makes changes to the registry keys running this program.

Then the dropper saves the files instsrv.exe, srvany.exe, dnshost.exe, and yandexservice.exe to the System32 folder. Instsrv.exe, srvany.exe, and dnshost.exe are Microsoft utilities for creating user-defined services in Windows, while yandexservice.exe is the Trojan.Click3.27430 itself. Then the dropper registers the executable file yandexservice.exe, which implements the malicious features of Trojan.Click3.27430 as a service named “YandexService”. Upon installation, the service is added to the Windows Autorun list. When the dropper saves and launches the malicious service, it installs the DynDNS application. If the user decides to uninstall it from their infected computer, only DynDNS will be removed; meanwhile, Trojan.Click3.27430 will remain in the system and continue its malicious activity.

The malware analysts also investigated another component of the Trojan: the executable file dubbed dnsservice.exe, which is also installed on the infected computer as a Windows service named DNS Service. The specific debug lines that the virus writer forgot to delete in his malware programs are a giveaway:


C:\Boris\Программы\BDown\Project1.vbp 
C:\Boris\Программы\BarmashSetService\Project1.vbp
C:\Boris\Программы\Barmash.en.new\Project1.vbp 
C:\Boris\Программы\Barmash_en_Restarter3\Project1.vbp

This component is distributed as the file dnsservice.arj, which is disguised as an archive from barmash.ru.

screenshot Trojan.Click3.27430 #drweb

All known modifications of Trojan.Click3.27430 are detected and removed by Dr.Web, and the websites dnsip.ru, dns-free.com, and barmash.ru have been added to the SpIDer Gate web anti-virus’s list of non-recommended Internet resources.

According to data gathered by Doctor Web, as of now, about 1,400 users have been affected by this Trojan, with the first infections occurring in 2013. The complete list of indicators of compromise can be found here.

More about this Trojan

#clicker #Trojan

Tell us what you think

You will be awarded one Dr.Webling per comment. To ask Doctor Web’s site administration about a news item, enter @admin at the beginning of your comment. If your question is for the author of one of the comments, put @ before their names.


Other comments

The Russian developer of Dr.Web anti-viruses

Doctor Web has been developing anti-virus software since 1992

Dr.Web is trusted by users around the world in 200+ countries

The company has delivered an anti-virus as a service since 2007

24/7 tech support

© Doctor Web
2003 — 2019

Doctor Web is the Russian developer of Dr.Web anti-virus software. Dr.Web anti-virus software has been developed since 1992.

2-12А, 3rd street Yamskogo polya, Moscow, Russia, 125040