Threat Description

Haxdoor.M

Details

Category: Malware
Type: Backdoor
Platform: W32
Date Discovered: June 15, 2006

Summary


Haxdoor is a powerful backdoor with rootkit capabilities. It can hide its presence (processes and files) on an infected system so that it can be only detected using either anti-virus with kernel drivers or a rootkit detector. This backdoor has spying capabilities and it has lately been used to steal bank-related information (logon and passwords for online bank accounts) and other information.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


When the backdoor is executed, it drops the following files in the Windows System32 folder:

  • pptp16.dll
  • pptp24.sys
  • qz.dll
  • qz.sys

During the execution, it also creates the following registry keys:

  • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\pptp16
  • HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\pptp16.sys
  • HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\pptp24.sys
  • HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\pptp16.sys
  • HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\pptp24.sys

The HKLM modification allows the backdoor to start when a user logs on. It also sets to '0' the value EnforceWriteProtection under the key:

  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Memory Management

thus disabling memory write protection for the computer.After this, it will start the following services that will also be automatically started every time that the system is booted:

  • MMX virtualization service
  • MMX2 virtualization service

Haxdoor is quite powerful and it is especially used to commit acts of economic fraud/theft, most of which are particularly targeted at Internet Explorer users. It targets several worldwide banks and financial services, both stealing account information and performing pharming.The following list is a sample of the banks included:

  • Alliance-leicester
  • Barclays
  • Cajamadrid
  • Deutsche-bank
  • E-Bullion
  • Firepay
  • Halifax
  • Lloyds
  • Mastercard
  • Paypal
  • Wellsfargo
  • Westernunion
  • Yambo Financials

The backdoor also features a generic mechanism for stealing account information. In addition to this, Haxdoor.M will redirect traffic from several security websites to a Microsoft website. The list of redirected URLs:

  • avp.ch
  • avp.com
  • avp.ru
  • awaps.net
  • customer.symantec.com
  • d-eu-1f.kaspersky-labs.com
  • d-eu-2f.kaspersky-labs.com
  • dispatch.mcafee.com
  • download.mcafee.com
  • downloads1.kaspersky-labs.com
  • downloads1.kaspersky-labs.com
  • downloads1.kaspersky-labs.com
  • downloads2.kaspersky-labs.com
  • downloads3.kaspersky-labs.com
  • downloads4.kaspersky-labs.com
  • downloads-us1.kaspersky-labs.com
  • downloads-us2.kaspersky-labs.com
  • downloads-us3.kaspersky-labs.com
  • d-ru-1f.kaspersky-labs.com
  • d-ru-2f.kaspersky-labs.com
  • d-us-1f.kaspersky-labs.com
  • engine.awaps.net
  • f-secure.com
  • ftp.avp.ch
  • ftp.downloads2.kaspersky-labs.com
  • ftp.f-secure.com
  • ftp.kaspersky.ru
  • ftp.kasperskylab.ru
  • ftp.sophos.com
  • ids.kaspersky-labs.com
  • kaspersky.com
  • kaspersky-labs.com
  • liveupdate.symantec.com
  • liveupdate.symantec.com
  • liveupdate.symantec.com
  • liveupdate.symantecliveupdate.com
  • liveupdate.symantecliveupdate.com
  • mast.mcafee.com
  • mcafee.com
  • my-etrust.com
  • networkassociates.com
  • phx.corporate-ir.net
  • rads.mcafee.com
  • securityresponse.symantec.com
  • service1.symantec.com
  • sophos.com
  • spd.atdmt.com
  • symantec.com
  • trendmicro.com
  • update.symantec.com
  • updates.symantec.com
  • updates1.kaspersky-labs.com
  • updates1.kaspersky-labs.com
  • updates2.kaspersky-labs.com
  • updates3.kaspersky-labs.com
  • updates3.kaspersky-labs.com
  • updates4.kaspersky-labs.com
  • updates5.kaspersky-labs.com
  • us.mcafee.com
  • virustotal.com

Additionally, the backdoor can steal the following info:

  • IMAP password
  • IMAP server name
  • IMAP user name
  • POP3 password
  • POP3 server name
  • POP3 user name

Haxdoor.M also includes older functionality in other variants already detected by F-Secure. Additional details can be found in the description for Haxdoor.



Detection


F-Secure Anti-Virus detects this malware with the following updates:

Detection Type: PC
Database: 2006-06-15_01




SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More