Proxy-Raser

This page shows details and results of our analysis on the malware Proxy-Raser

Overview

This detection is for malware intended to serve as a proxy on the victim machine.  These proxy trojans act as a middleman between a requesting system and a destination host. They are designed to listen on a specified TCP port for incoming requests.  Those requests are then sent out from the infected system to the desired destination.  The response from the destination server is rerouted back to the originating host by the proxy trojan.

This proxy allows for a trojan author/distributor to use the infected system as a type of identity shield, allowing them to navigate to different locations on the Internet without divulging who or where they really are.

Such proxies can be used to surf the web anonymously, hack systems, or relay spam.


Minimum Engine

5600.1067

File Length

varies

Description Added

2005-11-25

Description Modified

2007-05-11

Malware Proliferation

Characteristics

There are multiple versions of this trojan proxy - the details below are specific to one such variant. Exact details such as filename, Registry key name, filesize etc will vary.

Upon execution, the trojan drops the following files:

  • %SystemDir%\TheMatrixHasYou.exe
  • %SystemDir%\mini2tone.ini
  • %SystemDir%\mzu_drv.sys (Proxy-Raser.sys)

The trojan adds the following registry keys:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    "_mzu_stonedrv3" = (trojan filepath)
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
    "_mzu_stonedrv3" = (trojan filepath)
  • HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MZU_RK
    "DisplayName" = "MZU_RK"
     "ErrorControl" = 1
    "ImagePath" = %SystemDir%\mzu_drv.sys
    "ProcessName" = (trojan filepath)
    "Start" = 2
    "Type" = 1
  • HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MZU_RK
    "DisplayName" = "MZU_RK"
     "ErrorControl" = 1
    "ImagePath" = %SystemDir%\mzu_drv.sys
    "ProcessName" = (trojan filepath)
    "Start" = 2
    "Type" = 1

The trojan opens a random tcp port and waits commands from the remote author.
Then it sends the notification to the following sites:

  • jupitersatellites.biz
  • drwebupd.com
  • check.drwebupd.com

The trojan also attempts download updates of the trojan from the following site.

  • http://download.drwebupd.com/traff/[removed].exe

Symptoms

  • Unexpected network traffic
  • Presence of the files and registry entries detailed above

Method of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email, etc.

Removal

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

But in some particular cases, the following steps need to be taken.

Please go to the Microsoft Recovery Console and restore a clean MBR.

On Windows XP:

  • Insert the Windows XP CD into the CD-ROM drive and restart the computer.
  • When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
  • Select the Windows installation that is compromised and provide the administrator password.
  • Issue 'fixmbr' command to restore the Master Boot Record
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.


On Windows Vista and 7:

  • Insert the Windows CD into the CD-ROM drive and restart the computer.
  • Click on "Repair Your Computer".
  • When the System Recovery Options dialog comes up, choose the Command Prompt.
  • Issue 'bootrec /fixmbr' command to restore the Master Boot Record.
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.

Variants