Classification

Category :

Malware

Type :

Backdoor

Aliases :

Hearse.A

Summary

Hearse.A is a backdoor that steals passwords and account information. It also installs a SOCKS proxy and a backdoor that allows access to an infected system. Hearse.A uses rootkit techniques to hide its files.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

System installation

When the backdoor file is run, it drops the following two files to the Windows system directory:

  • zopenssl.dll
  • zopenssld.sys

Then the backdoor creates the following registry key: [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\zopenssl] "DllName" = "zopenssl.dll" Durin the system start, this registry key loads the backdoor main file, zopenssl.dll, to the address space of Winlogon.exe. When the DLL is activated, it starts the rootkit as a system service and runs the actual backdoor.The rootkit system service is activated using the following arguments:

  • BinaryPathName: zopenssld.sys
  • ServiceName: zopenssld
  • DisplayName: OPENSSL cryptoapi

Hearse.A may also create the following files:

  • nwr7.ies4
  • bklks.ies4
  • nwr8.ies4

Rootkit Hiding Techniques

Hearse.A is able to hide the following items:

  • Files and directories

When it is active it hides its own files.Hearse.A installs and executes a kernel-mode driver (zopenssld.sys) to execute code in privilege level 0 (kernel mode). The kernel-mode code replaces the following function pointers from the system service table:

  • NtCreateProcess
  • NtCreateProcessEx
  • NtQueryDirectoryFile

This allows it to inject code into any newly created process. In addition, it hides files or directories with any of the following names:

  • nwr7.ies4
  • zopenssl.dll
  • bklks.ies4
  • zopenssld.sys
  • nwr8.ies4

Backdoor functionality

Hearse.A uses HTTP requests for communicating with a remote server controlled by the attacker. The server may request the infected system to perform any of the following actions:

  • Run any program on the system
  • Download additional files
  • Spawn an interactive command shell
  • Create and send a screenshot of the desktop
  • Collect and send passwords and other account information
  • Uninstall the backdoor

Hearse.A also starts up a SOCKS proxy on the infected system. The proxy port is reported back to the attacker by including it in the HTTP requests described above.