Installation to system
Agent.aa file is a PE executable image, packed with executable
compressor PECompact. The packed size is about 37 kilobytes.
When run, the trojan copies itself under Windows directory
using the name 'mscsvc.exe'. It installs the following registry
key to make sure it will be executed next time the system is started:
"mscsvc.exe" = "%WinDir%\mscsvc.exe"
For example, %WinDir% is 'C:\Windows' in default installation
of Windows XP.
The trojan monitors active Internet Explorer instances. When a web
page containing certain domain names is visited, the trojan logs
data from the web page, including key strokes. Domain names are
mostly online banks. It may also take screenshots of browser windows
while visiting these domains.
Here is the list of domain names that are monitored (in alphabetical
Note that it doesn't automatically mean that the listed online
banks are affected. Most online banks use proper one-time password
authentication schemes, and are thus not in danger.
The trojan also tries to fetch cached accounting information from
the infected computer, such as
Internet Explorer FTP usernames/passwords
Outlook Account Manager Passwords
IMAP, POP3 usernames/passwords
Also, some generic system information, such as installed software,
running process etc. are gathered from the infected system.
Stealed data is sent to server 'radconsulting.net' using HTTP
Jarkko Turkulainen; May 03th, 2005;