Antidetect.AB , a Malware uses Microsoft Register Server to avoid detection by Anti-Virus programs.
The Dell Sonicwall Threats Research team observed reports of a New Malware family named GAV: Antidetect.AB actively spreading in the wild. This time attacker uses Microsoft Register Server and Manipulates windows registry to avoid detection by Anti-Virus programs.

Infection Cycle:
The Malware uses the following icon:

Md5:
-
9d994203fc51b31aa3f661a1dfe5374b
The Malware adds the following file to the system:
-
Malware.exe
-
%Userprofile%Local SettingsApplication Data[Random Name][Random Name].exe
-
The Malware adds the following keys to the Windows registry to ensure persistence upon reboot:
-
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun
-
HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun

The malware manipulates the windows registry; even if you run Msconfig.exe or Regedit.exe you would not be able to see any evidence of the malware.
Here is an example:

Once the computer is compromised, the malware copies its own executable file to %Userprofile%Local SettingsApplication Data folder With Random name and then injects Regsvr32.exe to collects information from target system.

Here is an example of the Malware injection:

The malware tries to transfers your personal information to its own C&C server such as following domains:



Command and Control (C&C) Traffic
Antidetect.AB performs C&C communication over 80 and 443 ports. The malware sends your system information to its own C&C server via following format, here are some examples:


We have been monitoring varying hits over the past few days for the signature that blocks this threat:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:
-
GAV: Antidetect.AB (Trojan)