General Explanation
Type: Trojan
Degree of destruction: high
Prevalence: average
What is a Trojan?
Trojans are types of malware that reveal themselves as legal and healthy software and act most like useful and applicable software but create more destruction for the system when they are executing. Downloaded software from the internet, placing in the HTML text, attaching to an email, etc. are ways for Trojans to enter. Trojans, contrary to computer viruses and worms, are not capable of reproducing.
What is Servhelper malware?
This malware family existed in 2 versions of Dropper and Backdoor. The Backdoor version proceeds to send information and receive instructions by connecting to specific servers. In the Dropper version, it proceeds to create the malware. One of the other goals of this malware is to steal stored information from the user’s browser.
Technical Explanation
Some types of malware inject their malicious code into the systemic process msra.exe which is the desktop remote systemic process. The other type of this family Drops the FlawedGrace malware. Some types also placed the helpobj.bat in the system and execute it using rundll32.exe. The distribution method is to attach infected files to the email as a word file containing infected macro will connect to malicious URLs and downloads the infected files or a PDF file containing a seemingly valid link to update the latest version of adobe reader software, while this malicious link causes to download the malware.
In the observed samples by the Padvish malware analysis laboratory, a PDF file containing a seemingly valid link for updating Adobe Reader software to the latest version has been found.
The mentioned link address:
- http://www.adobe.com/products/acrobat/readstep2.html
But this is only the appearance of the link and the real address of this link is the following URL:
- https://adobeupdt.net/En-US/reader/download/?installer=Reader_DC_2019.009.20088_English_Windows
which is a malicious link.
Signs of infection
Different versions of this malware have different signs
- In some versions, the following signs are obvious:
%USER%\appdata\local\temp\NtWrite.dat
%USER%\appdata\local\temp\tmp31.tmp
- msra.exe is running (systemic process and standard remote desktop) and its attempts to connect with the following addresses:
- Checksolutions[.]pw:443
- Afgdhjkrm[.]pw:443
- pointsoft[.]pw:443
- dedoshop[.]pw:443
- In some versions the following signs are obvious:
- Creating a service to trust that will place its file with the name of winreset in the following address:
%PROGRAMFILES%\(x86)\Common Files\System\winreset.exe
- Two running processes of the winreset.exe service.
- Attempt to connect with the following IP: 46.161.27.241
- Creating a service to trust that will place its file with the name of winreset in the following address:
- In some versions, the following signs are obvious:
- existence of helpobj.dat, zxa.bat, sdw. vbs, 1.Ink file in the following path:
%USER%\appdata\local\temp</
- Two running processes of rundll32.exe that executing helpobj.dat and attempt to connect with the following addresses:
Checksolutions[.]pw:443
Afgdhjkrm[.]pw:443
pointsoft[.]pw:443
dedoshop[.]pw:443<
- existence of helpobj.dat, zxa.bat, sdw. vbs, 1.Ink file in the following path:
How to deal with it and disinfect the system
Padvish Antivirus detects and disinfects this malware. To prevent entering these types of malware into your system it is recommended to avoid clicking on suspicious links and scan attached links before execution. Also, keep your OS and antivirus up to date, if possible.