Gnutella Forums  

Go Back   Gnutella Forums > Gnutella News and Gnutelliums Forums > General Gnutella / Gnutella Network Discussion
Register FAQ The Twelve Commandments Members List Calendar Arcade Find the Best VPN Today's Posts

General Gnutella / Gnutella Network Discussion For general discussion about Gnutella and the Gnutella network.
For discussion about a specific Gnutella client program, please post in one of the client forums above.


Reply
 
LinkBack Thread Tools Display Modes
  #1 (permalink)  
Old December 30th, 2001
Unregistered
Guest
 
Posts: n/a
Post Trojan hidden in many p2p apps

A trojan called dlder.exe is hidden in a mutlitude of p2p apps.

The most prominent are Kazza and Limewire, Grokster, and the new Bearshare Beta.

It is a hidden part of the ClickTiluWin adware. The people of Limewire and kazza did not even know it was a trojan.

This is a newly discovered trojan, but it has been in distribution for quite some time. Tens of thousands must have been infected.


For more information see the Bearshare forums
http://bearshare.net/forum/showthrea...&threadid=8252

Description which is somewhat incomplete:
The following was obtained from TrendMicro
W32.DlDer.Trojan

TROJ_DLDER.A
(continued from profile page)

In the wild: No
Detection available: December 27, 2001
Detected by pattern file#: 191 or 991
(note about pattern numbering)
Detected by scan engine#: 5.200
Language:
English
Platform: Windows
Encrypted: No
Size of virus: ~31,232 bytes / ~40,960 bytes

Details:
This trojan is a Visual C++ compiled program. Upon execution it drops a file named DLDER.EXE under the %windows% directory. It adds the registry entries:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
Dlder=“%windows%\dlder.exe”
HKEY_LOCAL_MACHINE\Software\games\clicktilluwin

After modifying the registry, the trojan connects to the site www.2001-007.comand and provides the user's IP address and default browser. It then sends an incrementing integer that possibly indicates the number of infected computers.

This trojan program is also installed along with two file-sharing programs, Grokster 1.3.3 and LimeWire 2.0.2. Both programs are downloadable from the website http://www.grokster.com. Grokster is downloaded from the *US-site* as SETUP.EXE and LimeWire as LIMEWIREWIN.EXE.

Upon installation of these file-sharing programs, TROJ_DLDER.A is also installed on the computer without the user’s knowledge. Aside from the file DLDER.EXE in the %windows% folder, a hidden folder named "explorer" is also created in the %windows% folder. The hidden folder contains a file named EXPLORER.EXE. The following files are also created:

C:\Program Files\Clicktilluwin\clicktilluwin.htm
C:\Program Files\Clicktilluwin\game.ico
C:\Windows\Start Menu\Programs\Clicktilluwin\clicktilluwin.lnk
C:\Windows\Desktop\Clicktilluwin.lnk


It may also add the registry entry:

HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run:
Dlder = "%windows%\explorer\explorer.exe"
Reply With Quote
  #2 (permalink)  
Old December 30th, 2001
Moak's Avatar
Guest
 
Join Date: September 7th, 2001
Location: Europe
Posts: 816
Moak is flying high
Default

Thanks!

The funny/ironical thing is, if we can rate this funny, those well known Spyware bundler did now loosing total controll over Spyware! More infected users... and hopefully more users which stop to trust in Spyware bundled software.

My conclusion/advice: Use a new virus scanner and fresh updated AdAware in regular distance. Don't trust vendor promises about Spyware or so called 'Adware', get informed. Choose 100% spyware free software.
Reply With Quote
  #3 (permalink)  
Old December 30th, 2001
Unregistered
Guest
 
Posts: n/a
Default

Quote:
Originally posted by Moak
My conclusion/advice: Use a new virus scanner and fresh updated AdAware in regular distance.
Here is another way to deactivate the trojan, along with a description from F-Secure.com:

This two-component trojan was discovered in the end of December 2001. The trojan being installed on a user's system constantly upgrades its main component that connects to 2001-007.com website and reports user's ID, web browser a user is using and all URLs that a web browser and all its child windows open. The trojan violates user's privacy and opens a security hole in a system by downloading and activating executable files.

The main component of the trojan is Explorer.exe file that is located in Windows folder in \Explorer\ subfolder (do not mix with the original Windows' Explorer.exe). This component is constantly upgraded by the second trojan component that has the name 'DlDer.exe' and is located in Windows folder.

The DlDer.exe file is most likely dropped to user's system by ActiveX applet or Javascript code that a user doesn't notice when he is browsing Internet. The exact way how this file is dropped is not yet known. The case is under investigation.

The DlDer.exe file when it is started downloads Explorer.exe file from a website and puts it to \Windows\Explorer\ folder. Then the trojan creates a startup key for Explorer.exe file. On next System restart the Explorer.exe file is activated and it creates a startup key for DlDer.exe file and starts to connect to 2001-007.com website and report user's ID, web browser and all URLs that a user visits to there.

We recommend to delete both trojan components from an infected system. If these components can't be deleted (locked files) they should be deleted from pure DOS (in case of Windows 9x system) or renamed with different extensions (EXA for example) with immediate system restart (in case of Windows NT/2000/XP system).
Reply With Quote
  #4 (permalink)  
Old December 31st, 2001
Connoisseur
 
Join Date: August 9th, 2001
Location: Philadelphia, PA, USA
Posts: 358
cultiv8r is flying high
Default

Just to let people know this isn't some hoax or a falsie:

http://www.antivirus.com/vinfo/virus...e=TROJ_DLDER.A

A free online scanner able to find this trojan is also available from TrendMicro at this URL:

http://housecall.antivirus.com/

Please note that the above's virus scanner's e-mail registraion is OPTIONAL (read the instructions!)

-- Mike
Reply With Quote
  #5 (permalink)  
Old December 31st, 2001
Moak's Avatar
Guest
 
Join Date: September 7th, 2001
Location: Europe
Posts: 816
Moak is flying high
Default

yep, this message is definitely no hoax!
Here is the link to F-Secure: http://www.europe.f-secure.com/v-descs/dlder.shtml
Reply With Quote
  #6 (permalink)  
Old December 31st, 2001
Connoisseur
 
Join Date: August 9th, 2001
Location: Philadelphia, PA, USA
Posts: 358
cultiv8r is flying high
Exclamation How it could be done...

I think I know how this trojan is spread. I don't think the trojan comes installed with P2P clients such as Grokster and LimeWire, since I have had LW 2.0.2 on one of my systems for a little while, and it was clean from this trojan.

I think that the problem starts with a flaw in the Cydoor software (providing the advertisements). Since P2P applications publish their IP address on host caches, one has easy access to all users using software with Cydoor. All you would have to figure out is exactly which client uses Cydoor.

The recent versions of LimeWire uses an "User-Agent:" field in the handshake. The "Pro" version of LimeWire even adds "Pro" to the User-Agent field. So it will be very easy to check if a client is LimeWire with or without Cydoor.

Once the mallicious user or system discovers the user uses Cydoor, the flaw in Cydoor is used to download DLDER and install it. The "Run" is probably part of Cydoor as well, to allow updating of locked files (when Cydoor is downloading an ad or update, it is most likely locking one of its own files as it is active).

The mallicious user(s) probably use DLDER instead of directly injecting a bad EXPLORER.EXE, because Cydoor itself cannot modify do this for security reasons. So the DLDER acts on behalf of Cydoor once it has accessed your system, circumventing Cydoor's security for altering system files. That probably explains why DLDER is used only once as well.

This is just a theory of how it systems might get infected, and I'll forward it to TrendMicro for them to look into.

-- Mike
Reply With Quote
  #7 (permalink)  
Old December 31st, 2001
Novicius
 
Join Date: December 31st, 2001
Posts: 2
ragger is flying high
Default

It is actually in the Limewire installer.
If you start the installer a bunch of files get extracted to your temp directory. One of those files is ctywinstaller.exe, a self extracting rar file that contains the clicktilluwin files including dlder.exe and explorer.exe.
Reply With Quote
  #8 (permalink)  
Old December 31st, 2001
Connoisseur
 
Join Date: August 9th, 2001
Location: Philadelphia, PA, USA
Posts: 358
cultiv8r is flying high
Default

Serious? That's some nasty stuff then.

I must have had a slightly older version of LW then, because I really don't have it on my system after installing it. So it definetely is in LW 2.0.2 though. *sighs* Lovely.
Reply With Quote
  #9 (permalink)  
Old December 31st, 2001
Pallando's Avatar
Illuminator
 
Join Date: October 14th, 2001
Location: Germany
Posts: 47
Pallando is flying high
Default ctyw

So obviosly it´s from the "Clicktiluwin" thing!
Every P2P software this boy is included, the Trojan apperars!
Reply With Quote
  #10 (permalink)  
Old December 31st, 2001
Moak's Avatar
Guest
 
Join Date: September 7th, 2001
Location: Europe
Posts: 816
Moak is flying high
Default

yep, same for Bearshare AFAIK. What is the purpose of "Clicktiluwin"?
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
hidden files joh General Windows Support 1 July 1st, 2005 06:58 PM
hidden downloading? astral_man Windows 4 May 24th, 2005 04:32 PM
Hidden IP Addresses Drumwzrd Open Discussion topics 0 December 27th, 2004 08:28 PM
hidden downloads? Unregistered General Mac Support 2 December 18th, 2001 10:19 AM
Hidden Goodies... Booga Support: General 1 September 20th, 2001 09:16 PM


All times are GMT -7. The time now is 10:40 PM.


Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
SEO by vBSEO 3.6.0 ©2011, Crawlability, Inc.

Copyright © 2020 Gnutella Forums.
All Rights Reserved.