请输入您要查询的百科知识:

 

词条 Trojan.Win32.DNSChanger
释义

  1. Behaviour

  2. Other Aliases

      Other Variants    Other registry modifications made involve creating these keys  

  3. See also

  4. References

  5. External links

Trojan.Win32.DNSChanger (or Trojan:Win32/Dnschanger (Microsoft Malware Protection Center)) is the definition of multiple AV-Labs, of a (backdoor) Trojan. Due to McAfee Labs, this Malware variant was detected on April 19, 2009, though Microsoft Malware Protection Center knew about this threat since December 8, 2006.[1][2]

Behaviour

DNS changer Trojans are dropped onto systems by other malware such as TDSS or Koobface.[3] The DNS-Changer-Trojan is a malicious .exe file, but is unable to spread of its own accord. It may therefore perform several actions of an attacker's choice on an compromised computer, such as changing the Domain Name Server (DNS) settings in order to divert traffic to unsolicited, and potentially illegal and/or malicious domains.[1][2]

The Win32.DNSChanger is used by organized crime syndicates to maintain Click-Fraud. In that moment the (unaware) user's browsing activity is secretly manipulated (such as altering the user who clicks on a (for him seemingly) legitimate link to then be forwarded to another offered site), so that the attackers can generate revenues from pay-per-click online advertising schemes. Mostly this trojan is usually an extremely small file (+/- 1.5 kilobytes) that is designed to change the 'NameServer' Registry key value to a custom IP address or link. This called IP address is encrypted in the body of a trojan. As a result of this change, a victim's Device will contact the newly assigned DNS-server to resolve names of different webservers, sometimes randomly.[4]

//Trend Micro">TrendMicro systems described following behaviors of Win32.DNSChanger.
  • Steering unknowing users to bad sites: These sites can be phishing pages that spoof well-known sites in order to trick users into handing out sensitive information. A user who wants to visit the iTunes site, for instance, is instead unknowingly redirected to a rogue site.
  • Replacing ads on legitimate sites: Visiting certain sites can serve users with infected systems a different set of ads from those whose systems are not infected.
  • Controlling and redirecting network traffic: Users of infected systems may not be granted access to download important OS and software updates from vendors like Microsoft and from their respective security vendors.
  • Pushing additional malware: Infected systems are more prone to other malware infections (e.g., FAKEAV infection).[3]

Other Aliases

  • Win32:KdCrypt[Cryp] (Avast)
  • TR/Vundo.Gen (Avira)
  • MemScan:Trojan.DNSChanger (Bitdefender Labs)
  • Win.Trojan.DNSChanger (ClamAV)
  • variant of Win32/TrojanDownloader.Zlob (ESET)
  • Trojan.Win32.Monder (Kaspersky Labs)
  • Troj/DNSCha (Sophos)
  • Mal_Zlob (Trend Micro)
  • MalwareScope.Trojan.DnsChange (Vba32 AntiVirus)

Other Variants

  • Trojan.Win32.DNSChanger.al
F-Secure received samples of a variant that were named PayPal-2.5.200-MSWin32-x86-2005.exe. In this Case the PayPal attribution indicates that Phishing is likely.[5] This trojan was programmed to change the DNS server name of a victim's computer to IP address 193.227.227.218.[6]

The Registry key that is affected by this trojan is:

  • HKLM\\SYSTEM\\ControlSet001\\Services\\Tcpip\\Parameters\\Interfaces\\NameServer

Other registry modifications made involve creating these keys

  • HKLM\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces\\{random} DhcpNameServer = 85.255.xx.xxx,85.255.xxx.xxx
  • HKLM\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces\\{random} NameServer = 85.255.xxx.133,85.255.xxx.xxx
  • HKLM\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\ DhcpNameServer = 85.255.xxx.xxx,85.255.xxx.xxx
  • HKLM\\SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\ NameServer = 85.255.xxx.xxx,85.255.xxx.xxx[6]

See also

  • DNSChanger
  • DNS hijacking
  • Rove Digital case
  • Zlob trojan

References

1. ^[https://home.mcafee.com/virusInfo/VirusProfile.aspx?key=154863 DNSChanger | Virus Profile & Definition | McAfee Inc]
2. ^Trojan:Win32/Dnschanger
3. ^[https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/125/how-dns-changer-trojans-direct-users-to-threats How DNS Changer Trojans Direct Users to Threats - Threat Encyclopedia - Trend Micro USA]
4. ^{{cite web | url=https://www.f-secure.com/v-descs/dnschang.shtml | title=Trojan:W32/DNSChanger |accessdate=17 December 2018 | author= F-Secure}}
5. ^Phishing attack hits PayPal subscribers | V3
6. ^[https://www.f-secure.com/weblog/archives/00002268.html News from the Lab Archive : January 2004 to September 2015]

External links

  • [https://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/125/how-dns-changer-trojans-direct-users-to-threats How DNS Changer Trojans Direct Users to Threats] by TrendMicro
  • [https://www.f-secure.com/weblog/archives/00002268.html FBI: Operation Ghost Click] (F-Secure)
  • ‘Biggest Cybercriminal Takedown in History’ (Brian Krebs @ krebsonsecurity.com)
  • [https://www.virustotal.com/en/file/fdde13872caa1a0e1b9331188ca93b8fc424fed43d86d5cf53f6965f6a77184e/analysis/ Analysis of a DNSChanger file] at VirusTotal

13 : Adware|Consumer fraud|Cybercrime|Domain name system|Hacking in the 2000s|Internet fraud|Internet Protocol based network software|Malware|Online advertising|Organized crime activity|Spamming|Trojan horses|Windows trojans

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/14 13:11:14