File Name: | WPBT0.DLL |
Size: | 174592 byte |
MD5 | 37f939b59edce18204f3db1fc18e79ff |
Compressed file: | UPX |
File Time Stamp: | 17/07/2011 21.58.49 |
Autorun key: | From the start menu (%user%\Menu Avvio\Programmi\Esecuzione automatica\wpbt0.dll.lnk |
Trojan.Win32.FakeGdf.A to be executed at the startup create the file wpbt0.dll.lnk inside Windows' start menu. wpbt0.dll.lnk then executes Rundll32.exe to load malware's DLL.
C:\WINDOWS\SYSTEM32\RUNDLL32.EXE %user%\IMPOST~1\TEMP\WPBT0.DLL,SUPPS
It is noteworthy that the timestamp reports 17th July 2011 as the time where the virus was compiled.
After the decompression of wpbt0.dll, we can retrieve the following informations:
Versione del file:
CompanyName: Packard Bell BV FileDescription: Creek Two Chasm Coven Braid Fluid FileVersion: 9.10 InternalName: Tamer Hunk Molly Vital Migs Hula LegalCopyright: Jamb Flank Well Stacy 2001-2008 OriginalFilename: Curve.exe ProductName: Oars Axiom Coos Foamy Rack ProductVersion: 9.10 |
Project name is Sleds.dll
New variants of Trojan.Win32.FakeGdF that use random names have been discovered, they name the file like this:
0.[random name].exe
Here are some examples:
Trojan.Win32.FakeGdF.A removal:
Reboot the computer into safe mode with networking (press F8 repeatedly before windows startup).
During VirIT's scan it's possible that other files (different from wpbt0.dll) will be found infected from Trojan.Win32.FakeGdF.A
It is possible to manually remove the virus with the following steps:
For the other Trojan.Win32.FakeGdF variants:
where %user% :
Variants
Name |
Size |
MD5 |
Website IP |
Time stamp |
Trojan.Win32.FakeGdF.A |
174592 |
37f939b59edce18204f3db1fc18e79ff |
83.69.236.38 |
17/07/2011 21.58.49 |
Trojan.Win32.FakeGdF.B |
203264 |
1d10fb2bb8fac1122e2452975acfb701 |
31.31.200.105 |
14/12/2011 09.35.29 |
Trojan.Win32.FakeGdF.C |
203264 |
58bca204698ff459697e6c1d9b8a5519 |
31.31.200.105 |
14/12/2011 15.34.14 |
Trojan.Win32.FakeGdF.D |
180736 |
ef9b87a2780047307ac6c7280dc5feff |
78.47.58.6 |
12/01/2011 09.08.08 |
Trojan.Win32.FakeGdF.E |
194048 |
d0d0b5b6023d7534e05e44d18e7e11e1 |
78.47.58.6 |
15/12/2011 16.21.14 |
Trojan.Win32.FakeGdF.F |
203776 |
78900f3e233ac18e29795bf0381526c9 |
85.17.168.194 |
11/12/2011 20.43.32 |
Trojan.Win32.FakeGdF.G |
182272 |
750d4b7b1b0278b34f3afe15d81df559 |
46.161.31.157 |
26/06/2011 08.22.02 |
Trojan.Win32.FakeGdF.H |
171008 |
b9a08f4e586f278e2c3420676bcde367 |
64.120.143.226 |
14/03/2011 10.04.03 |
Trojan.Win32.FakeGdF.I |
193024 |
ec31d1eef414fefa17fef71573dd62f1 |
64.120.143.226 |
09/04/2011 13.07.01 |
Trojan.Win32.FakeGdF.J |
179200 |
76376367a43a2ac4e718ca6fc8932648 |
83.69.236.38 |
14/05/2011 11.16.59 |
Trojan.Win32.FakeGdF.K |
184320 |
3f657024d7a7e9da7215df7f87982df6 |
85.17.168.194 |
26/03/2011 08.38.56 |
Trojan.Win32.FakeGdF.L |
165376 |
4b6de49e05c9c27892f465ac663b387f |
64.120.143.226 |
28/02/2011 05.29.55 |
Trojan.Win32.FakeGdF.M |
185344 |
26caa122cc0d01f788af005ea0135d08 |
64.120.143.226 |
14/03/2011 07.02.45 |
Trojan.Win32.FakeGdF.N |
185856 |
d3b6c37e2de28822aae217b5e8b85d68 |
62.76.190.68 |
14/06/2011 09.30.20 |
Trojan.Win32.FakeGdF.O |
204288 |
102ac369ffb35df07fb0ead427e45955 |
78.47.15.197 |
15/07/2011 02.33.58 |
Trojan.Win32.FakeGdF.P |
195584 |
fc6042028b7b552cb2b2b09e8a28e550 |
78.47.15.197 |
27/04/2011 01.43.55 |
Trojan.Win32.FakeGdF.Q |
190464 |
73e8702fcb76dfb5dbf1a6ba48ef8325 |
64.120.143.226 |
16/02/2011 19.34.00 |
Trojan.Win32.FakeGdF.R |
199680 |
def27a897bff7e75155e7255083f868f |
64.120.143.226 |
28/02/2011 16.06.38 |
Informazioni sul sito hxxp://83.69.236.38
Il falso sito della Guardia di Finanza (hxxp://83.69.236.38) situato in Russia:
IP Information - 83.69.236.38 IP address: 83.69.236.38 Reverse DNS: taratatat.ru. Reverse DNS authenticity: [Could be forged: hostname taratatat.ru. does not exist] ASN: 28762 ASN Name: AWAX-AS (AWAX Telecom Ltd) IP range connectivity: 1 Registrar (per ASN): RIPE Country (per IP registrar): RU [Russian Federation] Country Currency: RUR [Russia Rubles] Country IP Range: 83.69.192.0 to 83.69.255.255 Country fraud profile: High City (per outside source): Moscow, Moskva Country (per outside source): RU [Russian Federation] Private (internal) IP? No IP address registrar: whois.ripe.net Known Proxy? No Informazione da WHOIS: % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Information related to '83.69.236.0 - 83.69.236.255' inetnum: 83.69.236.0 - 83.69.236.255 netname: AWAX-HOSTING-NET descr: "LTD AWAX Telecom" remarks: ******************************************** remarks: * Contact *****@hostline.ru * remarks: * for spam or other abuse matters. * remarks: ******************************************** country: RU admin-c: AVG6-RIPE admin-c: SVG217-RIPE tech-c: AVG6-RIPE tech-c: SVG217-RIPE status: ASSIGNED PA mnt-by: AWAX-MNT changed: ***@awax.su 20110526 source: RIPE person: Andrei V Gasov address: LTD AWAX Telecom address: Moscow, Orlovo-Davydovsky per., 2/5 str address: 129110 Moscow address: Russia phone: +7 495 6264747 fax-no: +7 495 6264747 e-mail: ***@hostline.ru nic-hdl: AVG6-RIPE mnt-by: AWAX-MNT changed: ***@awax.su 20110526 source: RIPE person: Sergey V Grenivetskiy address: LTD AWAX Telecom address: Moscow, Orlovo-Davydovsky per., 2/5 str. address: 129110 Moscow address: Russia phone: +7 495 6264747 fax-no: +7 495 6264747 e-mail: **@hostline.ru nic-hdl: SVG217-RIPE mnt-by: AWAX-MNT changed: ***@awax.su 20110526 source: RIPE % Information related to '83.69.232.0/21AS28762' route: 83.69.232.0/21 descr: NOC origin: AS28762 mnt-by: AWAX-MNT changed: ***@awax.su 20091005 source: RIPE % Information related to '83.69.236.0/24AS28762' route: 83.69.236.0/24 descr: NOC origin: AS28762 mnt-by: AWAX-MNT changed: ***@awax.su 20110124 source: RIPE |
Informazioni sul sito hxxp://31.31.200.105
IP Information - 31.31.200.105 IP address: 31.31.200.105 Reverse DNS: my.nononononon.ru. Reverse DNS authenticity: [Could be forged: hostname my.nononononon.ru. does not exist] ASN: 0 ASN Name: IANA-RSVD-0 IP range connectivity: 0 Registrar (per ASN): Unknown Country (per IP registrar): RU [Russian Federation] Country Currency: RUR [Russia Rubles] Country IP Range: 31.31.192.0 to 31.31.207.255 Country fraud profile: High City (per outside source): Unknown Country (per outside source): RU [Russian Federation] Private (internal) IP? No IP address registrar: whois.arin.net Known Proxy? No |
Informazioni sul sito hxxp://78.47.58.6
IP Information - 78.47.58.6 IP address: 78.47.58.6 Reverse DNS: xen1.it-mcp.ru. Reverse DNS authenticity: [Could be forged: hostname xen1.it-mcp.ru. does not exist] ASN: 24940 ASN Name: HETZNER-AS (Hetzner Online AG RZ) IP range connectivity: 2 Registrar (per ASN): RIPE Country (per IP registrar): DE [Germany] Country Currency: EUR [euros] Country IP Range: 78.46.0.0 to 78.47.255.255 Country fraud profile: Normal City (per outside source): Unknown Country (per outside source): DE [Germany] Private (internal) IP? No IP address registrar: whois.arin.net Known Proxy? No |
Informazioni sul sito hxxp://85.17.168.194
IP Information - 85.17.168.194 IP address: 85.17.168.194 Reverse DNS: [No reverse DNS entry per ns0.leaseweb.nl.] Reverse DNS authenticity: [Unknown] ASN: 16265 ASN Name: LeaseWeb (LEASEWEB AS) IP range connectivity: 6 Registrar (per ASN): RIPE Country (per IP registrar): *E [[RIPE Unlisted]] Country Currency: Unknown Country IP Range: 85.0.0.0 to 85.255.255.255 Country fraud profile: Normal City (per outside source): Amsterdam, Noord-Holland Country (per outside source): NL [Netherlands] Private (internal) IP? No IP address registrar: whois.ripe.net Known Proxy? No Link for WHOIS: 85.17.168.194 |
Informazioni sul sito hxxp://46.161.31.157
IP address: 46.161.31.157 Reverse DNS: vds.srv7.majorhost.net. Reverse DNS authenticity: [Could be forged: hostname vds.srv7.majorhost.net. does not exist] ASN: 0 ASN Name: IANA-RSVD-0 IP range connectivity: 0 Registrar (per ASN): Unknown Country (per IP registrar): RU [Russian Federation] Country Currency: RUR [Russia Rubles] Country IP Range: 46.161.0.0 to 46.161.63.255 Country fraud profile: High City (per outside source): Unknown Country (per outside source): RU [Russian Federation] Private (internal) IP? No IP address registrar: whois.arin.net Known Proxy? No Link for WHOIS: 46.161.31.157 |
Analysis by eng. Gianfranco Tonello
C.R.A.M. (Anti-Malware Research Center) by TG Soft