{"id":3615,"date":"2010-11-22T16:29:27","date_gmt":"2010-11-22T23:29:27","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=3615"},"modified":"2018-01-30T12:26:56","modified_gmt":"2018-01-30T19:26:56","slug":"karagany-isnt-a-doctor-but-plays-one-on-your-pc","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/11\/22\/karagany-isnt-a-doctor-but-plays-one-on-your-pc\/","title":{"rendered":"Karagany Isn&#8217;t a Doctor, but Plays One on Your PC"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2004.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/11\/22\/karagany-isnt-a-doctor-but-plays-one-on-your-pc\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2014.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;title=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2024.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;title=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2034.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;title=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2044.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;title=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2054.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;Title=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2064.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2074.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http:\/\/blog.webroot.com\/2010\/11\/22\/karagany-isnt-a-doctor-but-plays-one-on-your-pc\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2084.png\" \/><\/a><a title=\"Add to Yahoo Buzz\" href=\"http:\/\/buzz.yahoo.com\/buzz?targetUrl=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;headline=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Yahoo Buzz\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2094.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F11%2F22%2Fkaragany-isnt-a-doctor-but-plays-one-on-your-pc&amp;h=Karagany%20Isn%27t%20a%20Doctor%2C%20but%20Plays%20One%20on%20Your%20PC\" target=\"_blank\" rel=\"nofollow\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2104.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/08\/gs2114.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_icon2.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-3620\" title=\"20101122_karagany_icon2\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_icon2.png\" width=\"116\" height=\"106\" \/><\/a>A Trojan that pulls a sly performance of <em>now-you-see-me-now-you-don&#8217;t<\/em> disguises itself on an infected system as the <strong>Adobe Updater<\/strong>, a real program that&#8217;s installed alongside such mainstay applications as the <a href=\"http:\/\/get.adobe.com\/reader\" target=\"_blank\">Adobe Reader<\/a>. This method of hiding in plain sight means the downloader, <strong>Trojan-Downloader-Karagany<\/strong>, may remain active on an infected system for an extended period of time, reinfecting PCs even after the more obvious payloads have been cleared up.<\/p>\n<p>During the initial infection, subtlety is this Karagany&#8217;s strong suit. When executed, it pulls an act I find slightly more interesting than the conventional <em>file copies itself from one place to another, then deletes the original<\/em> behavior that is so common among contemporary malware.<\/p>\n<p>In this case, the malware app (which uses an Adobe icon) does copy itself to another location &#8212; the <strong>Application DataAdobe<\/strong> folder under the currently logged-in user&#8217;s account, using the filename<strong> AdobeUpdater.exe<\/strong> &#8212; but leaves behind a benign program afterward, in exactly the same place as the original, and with the same filename as the original. Watch this video to see just how slick this shell game can be.<\/p>\n<p>[vimeo 17098939]<\/p>\n<p>The Trojan makes a duplicate of a legitimate Windows app (the Microsoft HTML Application Host, or <strong>MSHTA.exe<\/strong>), naming the copy with the same filename the Trojan used at the time it was executed, and replaces itself with the renamed MSHTA.exe in precisely the same location. The effect is low-key &#8212; the program simply seems to lose its icon.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_err-log.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3622\" title=\"20101122_karagany_err.log\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_err-log.png\" width=\"77\" height=\"53\" \/><\/a><\/p>\n<p>You&#8217;ll also note that, when the Trojan pulls the big switcheroo, another file appears in the upper-right corner of the screen, named <strong>err.log4568468<\/strong> (it&#8217;s actually just <strong>err.log<\/strong> and seven random numbers). That&#8217;s a backup copy the Trojan makes of itself. The extra file the Trojan throws into the <strong>Application DataAdobe<\/strong> folder (<strong>AdobeUpdate .exe<\/strong> &#8211; with an extra space just before the period) is another copy of the benign MSHTA.exe file.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_loadplugin.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3625\" title=\"20101122_karagany_loadplugin\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_loadplugin.png\" width=\"535\" height=\"26\" \/><\/a><\/p>\n<p>The Downloader shows signs of being run more like a botnet. During a series of tests last week, it received the command <strong>loadplugin:localftp2<\/strong> followed by a URL, after which it created a subfolder, named <strong>plugs<\/strong>, where it stored a file named<strong> localftp2.dll<\/strong>.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_getantivirus2010_cmd.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3631\" title=\"20101122_karagany_getantivirus2010_cmd\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_getantivirus2010_cmd.png\" width=\"490\" height=\"21\" \/><\/a><\/p>\n<p>In later tests, the file received the command to download and execute a program called <strong>InstallAntivirus2010.exe<\/strong>. Gee, I wonder what that does. The Trojan forges the User-Agent string in the HTTP GET command so it appears in the Web server logs that the file is being downloaded by users of (one version or another of) the Opera browser.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_operastrings.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3632\" title=\"20101122_karagany_operastrings\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_operastrings.png\" width=\"261\" height=\"332\" \/><\/a><\/p>\n<p>Back to the real Adobe Updater for a moment. It resides along a different folder path than the one the malware chooses to install itself. The real updater is also digitally signed by Adobe Systems, something that&#8217;s clearly visible in the file properties sheet of the application.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_propcompare_text.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3624\" title=\"20101122_karagany_propcompare_text_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_propcompare_text_crop.png\" width=\"361\" height=\"172\" \/><\/a><\/p>\n<p>Of course, once the downloader&#8217;s rogue antivirus payload comes down the wire, all pretense of subtlety is thrown out the window. But by then, it&#8217;s too late to do anything about it.<\/p>\n<p>In this case, the domain where the download receives its instructions as well as its payloads is <strong>myusermanager.in<\/strong> &#8212; a site hosted in Latvia, despite the fact it uses India&#8217;s .in top-level domain in its name. The domain was idle all last week when I began testing the Trojan, but someone flipped the switch over the weekend, and it started pushing payloads to infected systems early Saturday morning.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_desktop.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3627\" title=\"20101122_karagany_rogue_desktop_crop\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_desktop_crop.png\" width=\"574\" height=\"393\" \/><\/a><\/p>\n<p>On one machine, we retrieved the fairly common <strong>Security Tool<\/strong> rogue. On another, we got a different but also common rogue, named <strong>Antivirus 2010.<\/strong> Either way, the cleanup is annoying; Both rogues disable certain key Windows features, like the ability to edit the Registry or launch the Task Manager, or change the background image. And, of course, both rogues are complete frauds.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_price.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3628\" title=\"20101122_karagany_rogue_price\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_price.png\" width=\"562\" height=\"456\" \/><\/a><\/p>\n<p>What I like the most about either rogue is that they have nicely appointed &#8220;payment&#8221; Web sites (such as <a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_2010billing_whois.png\" target=\"_blank\">2010billing.com<\/a>, shown above), where the fraud is completed when money changes hands. They even have local telephone numbers in the US, Canada, UK, and Australia, where you can direct vitriol when you discover you (or someone you know) has been scammed.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_refund-numbers_large.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-3629\" title=\"20101122_karagany_rogue_refund-numbers\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/11\/20101122_karagany_rogue_refund-numbers.png\" width=\"459\" height=\"304\" \/><\/a><\/p>\n<p>But don&#8217;t expect to get anything back from the company if you complain, and don&#8217;t bother emailing that <strong>webtopantivirus.com<\/strong> email address, either. The domain is parked and idle. You&#8217;re better off reporting the purchase to your credit card bank as a fraudulent transaction.<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Trojan that pulls a sly performance of now-you-see-me-now-you-don&#8217;t disguises itself on an infected system as the Adobe Updater, a real program that&#8217;s installed alongside such mainstay applications as the Adobe Reader. This method of hiding in plain sight means the downloader, Trojan-Downloader-Karagany, may remain active on an infected system for an extended period of [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3915,4997,7965,4209,7967,7961,7751,7969,4499,3619,3487,4597,7973,4441,7975,7963,4893,7971,4143,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3615"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=3615"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3615\/revisions"}],"predecessor-version":[{"id":23737,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/3615\/revisions\/23737"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=3615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=3615"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=3615"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=3615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}