One large group will slowly conquer another large group, reduce its numbers, and thus lessen its chance of further variation and improvement. <…> Small and broken groups and sub-groups will finally tend to disappear.
Charles Darwin. ‘On the Origin of Species’

The golden age of Trojans and viruses has long gone. Malicious programs created by enthusiasts for research purposes and for fun are now largely confined to history books and dusty computer incident reports.

They have been replaced by programs that put a heavy emphasis on making money.

If we ignore targeted attacks prepared by professionals for very specific purposes, what sort of malware do we most often hear about today? Encryption malware and DDoS botnets made up of IoT devices.

Both types are profitable for cybercriminals and relatively easy to implement. However, they are not the only types of malware capable of generating cash; we mustn’t overlook a third particularly numerous borderline malware family that includes advertising bots and modules, and partnership programs – all of which is typically referred to as potentially unwanted adware/potentially unwanted programs (PUA/PUP).

They are borderline because there is a fine line between classifying a program as adware and defining the same program as an outright Trojan.
In this paper, we will deal with one such renegade that has gone well beyond the limits of ‘fair play’ when it comes to advertising.

The malware in question is detected by Kaspersky Lab products as Trojan-Clicker.Win32.Magala.

Operating algorithm

Magala falls into the category of Trojan Clickers that imitate a user click on a particular webpage, thus boosting advertisement click counts.
It’s worth pointing out that Magala doesn’t actually affect the user, other than consuming some of the infected computer’s resources.

The main victims are those paying for the advertising; typically they are small business owners doing business with unscrupulous advertisers.

The first stage of infection involves the Trojan checking which version of Internet Explorer is installed and locating it in the system.
If it’s version 8 or earlier, the Trojan won’t run.
So, if you still have this version on your computer, there’s nothing to worry about.

The Magala Trojan Clicker: A Hidden Advertising ThreatChecking the version of Internet Explorer, virtual desktop initialization.
If the desired version of Internet Explorer is found, then, unbeknown to the user, a virtual desktop is initialized.

All further activities are performed here.

After that a sequence of utility operations is run (something that is typical for this malware family): autorun is set up, a report is sent to a hardcoded URL, and the required adware is installed.

To interact with the content of an open page, Magala uses IHTMLDocument2, the standard Window interface that makes it easy to use DOM tree.

The Trojan uses it to load MapsGalaxy Toolbar, installs it on the system and adds the site hxxp:// to the system registry, also associated with MapsGalaxy, so that it becomes the browser’s home page.

The Magala Trojan Clicker: A Hidden Advertising Threat
A simple check is incorporated into the Trojan to find out if the search bar has already been installed – this is done with the help of the appropriate registry branch.

The Magala Trojan Clicker: A Hidden Advertising Threat
Magala then contacts the remote server and requests a list of search queries for the click counts that need to be boosted.

The Magala Trojan Clicker: A Hidden Advertising ThreatReceiving the list of search queries
This list is sent ‘as is’, in a plain text file with lots of strings.

The Magala Trojan Clicker: A Hidden Advertising ThreatList of search queries
Using this list, the program begins to send the requested search queries and click on each of the first 10 links in the search results, with an interval of 10 seconds between each click.

The Magala Trojan Clicker: A Hidden Advertising Threat
The Magala Trojan Clicker: A Hidden Advertising Threat
Profit margin

As far as we know, an average cost per click (CPC) in a campaign like this is 0.07 USD.

The cost per thousand (CPM) comes to 2.2 USD.
It should be noted that Trojan Clickers are certainly not the most popular way of selling advertising: the method most in demand is the displaying of a set homepage, where each installation also costs 0.07 USD.

A botnet consisting of 1000 infected computers clicking 10 website addresses from each search result and performing some 500 search requests with no overlaps in the search results could ideally mean the virus writer earns up to 350 USD from each infected computer. However, these cost estimates are only approximations, and don’t typically occur in the real world.

The costs of different requests may vary greatly, and the price of 0.07 USD per click is also an average value.

Propagation statistics

As can be seen in the diagram below, Trojan-Clicker.Win32.Magala infections occur most often in Germany and the US.

This finding is corroborated by an analysis of the search requests for which the click numbers need to be boosted.

These statistics were collected from March to early June 2017.

The Magala Trojan Clicker: A Hidden Advertising Threat

Programs belonging to the potentially unwanted adware class do not typically pose as much of a threat to the end user as, say, encryption or banking malware does. However, there are two characteristic features to this malware class which make it difficult to deal with.

Firstly, there is the borderline functionality that blurs the lines between legitimate and malicious software.
It has to be clarified whether a specific program is part of a secure and legal advertising campaign or if it is illegitimate software performing similar functions.

A second important aspect of this class – its sheer quantity – also means a fundamentally different approach to any analysis is required.



Leave a Reply