A Trojan designed to steal passwords from online banking services.
During the installation, it deletes the key of the system registry SOFTWARE\Microsoft\Timer.
Installs the Trojan.Hosts.5006(sys) rootkit to the %WINDOWS%\xkkop.sys file.
Then into the %systemroot% folder it places the host5 file containing the following data:
scg5gh11
188.XXX.YYY.21 sbrf.ru
188. XXX.YYY.21 www.sbrf.ru
188. XXX.YYY.21 esk.sbrf.ru
188. XXX.YYY.21 www.esk.sbrf.ru
188. XXX.YYY.21 esk.zubsb.ru
188. XXX.YYY.21 www.esk.zubsb.ru
188. XXX.YYY 30 www.click.alfabank.ru
188. XXX.YYY.30 click.alfabank.ru
188. XXX.YYY.30 www.alfabank.ru
188. XXX.YYY.30 alfabank.ru
axfvr5gj7cc
The Trojan searches for the avp.exe process among the running processes. If avp.exe cannot be found, the malware registers the driver with the name mkdrv %WINDOWS%\xkkop.sys, runs it, and deletes the original launch file. If the avp.exe process is found, the Trojan extracts the ldr.dll library from its body and enters the value SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce rundll32.exe ldr.dll,Prkt to the system registry sub-tree responsible for auto run. After the system is restarted, ldr.dll is run. It deletes SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe=ldr.dll,Prkt, registers the driver with the name mkdrv %WINDOWS%\xkkop.sys, and launches it. Original launch file is deleted using a special BAT file.