Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Rootkit:W32/Agent.EA


Aliases:


Rootkit:W32/Agent.EA
Rootkit.Win32.Agent.ea

Malware
RootkitTrojan
W32

Summary

A program or set of programs which hides itself by subverting or evading the computer's security mechanisms, then allows remote users to secretly control the computer's operating system.



Disinfection & Removal


Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see .



Technical Details

Rootkit:W32/Agent.EA is a kernel-mode rootkit program that is capable of hiding its presence and activity from the user. While active, the rootkit uses the infected computer to sends spam messages.


Installation

Agent.EA arrives as a dropper that installs the main driver of the trojan and deletes itself. Upon execution, it creates the following file:

  • %System%\windbg48.sys

It installs the driver file as service by creating the following registry key:

  • HKLM\System\CurrentControlSet\Services\windbg48

The dropper deletes itself with the following batch file:

  • %Temp%\_uninsep.bat

Activity

When the driver file is activated, it might connect to one of the following remote sites in an attempt to retrieve spam messages:

  • www.konskyvolos.com
  • www.swinmaster.com

The driver also hides itself, its registry keys, and network traffic using rootkit techniques. The spamming routine is also implemented entirely in the kernel-mode component (windbg48.sys).







Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.