BHO Trojan follow-up information

From: Hubbard, Dan (dhubbard_at_WEBSENSE.COM)
Date: 06/30/04

Date:         Tue, 29 Jun 2004 15:32:48 -0700


Some more interesting information on BHO trojan:

We captured a sample file from the infected site:


"Decompiled" the CHM file

*hh -decompile c:\dir iexpl.chm (NA shows this as keylog.lotus)

Decompiled file: (idx.htm)
<img width=1 height=1
<object width=1 height=1
<object width=1 height=1

* As previously reported uses CHM vuln..

* The sjdif.exe is recognized as Downloader.hw from NA.

* Then we ran strings on sjdif.exe and found that it connects to another
website that downloads the reported Keylogger which connects to online
banking sites that was reported here by Internet Storm Center earlier
today from another remote website: (which is the
same file that you saw), this was set to download and be renamed to
a.scr along with dropping the BHO.

* This file is not in NA's AV's signature at the time of testing.

The location that was in the site serving the malcode (img1big.gif) is
running Apache 1.3.31 and appears to be a VHOST on a UK hosting company.

To date we have seen no unusual activity on our honeypots to alarm there
is a worm out there.

Does anyone else have a sample of sjdif.exe that they can run strings on
and share the information of what site is set to goto ? I am very
interested to see if the malcode has embedded in it different sites?

Dan Hubbard
Director, Security and Technology Research Websense Inc

NTBugtraq Editor's Note:

Want to reply to the person who sent this message? This list is configured such that just hitting reply is going to result in the message coming to the list, not to the individual who sent the message. This was done to help reduce the number of Out of Office messages posters received. So if you want to send a reply just to the poster, you'll have to copy their email address out of the message and place it in your TO: field.