Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/12/2012
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:90.112 Bytes
MD5 checksum:9009CBF134AC5189EFB868958EF1C1E5
VDF version:

 General Method of propagation:
   • No own spreading routine

   •  Mcafee: Spy-Peep
   •  Kaspersky: Backdoor.Win32.PeepViewer.m

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Registry modification
   • Steals information
   • Third party control

 Files It copies itself to the following location:
   • %SYSDIR%\explorer.exe

 Registry The following registry key is changed:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   Old value:
   • "Shell"="Explorer.exe"
   New value:
   • "Shell"="%SYSDIR%\explorer.exe"

 Backdoor Contact server:
One of the following:
   • 54web**********
   • 54web**********
   • 54web**********
   • 54web**********

Sends information about:
    • Computer name
    • CPU type
     Information about the network
     System directory
     Windows directory
     Information about the Windows operating system

Remote control capabilities:
     Download file
     Execute file
     Perform DDoS attack

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Andrei Gherman on Wednesday, November 30, 2005
Description updated by Andrei Gherman on Friday, December 2, 2005

Back . . . .