Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:11/12/2008
Type:Backdoor Server
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:378.552 Bytes
MD5 checksum:2ecbac909b205b5f0d7bd10cb3daccb9
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan.Win32.Pakes.mfa
   •  F-Secure: Trojan.Win32.Pakes.mfa

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Registry modification
   • Third party control

 Files It copies itself to the following location:
   • %WINDIR%\Norton_win32.exe

The following file is created:

%TEMPDIR%\%random character string% Furthermore it gets executed after it was fully created. This batch file is used to delete a file.

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\Norton_win32]
   • "Type"=dword:00000110
   • "Start"=dword:00000002
   • "ErrorControl"=dword:00000000
   • "ImagePath"=%WINDIR%\Norton_win32.exe
   • "DisplayName"="Norton_win32"
   • "ObjectName"="LocalSystem"
   • "Description"="%chinese text%"

 Backdoor Contact server:
The following:
   • 11826.**********

As a result it may send information and remote control could be provided.

 Injection – It injects itself into a process.

    Process name:
   • svchost.exe

 Miscellaneous Anti debugging
It checks for running programs that contain one of the following strings:
   • \\.\SICE
   • \\.\SIWVID
   • \\.\NTICE
   • \\.\REGSYS
   • \\.\REGVXG
   • \\.\FILEVXG
   • \\.\FILEM
   • \\.\TRW
   • \\.\ICEEXT
   • FileMonClass

If successful, it terminates immediately.

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Thomas Wegele on Thursday, December 18, 2008
Description updated by Thomas Wegele on Thursday, December 18, 2008

Back . . . .