Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Chinky.X
Date discovered:12/02/2010
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:69.632 Bytes
MD5 checksum:769e8b8e8cf2c396ef2ad88452f5a2f1
IVDF version:7.10.04.44 - Friday, February 12, 2010

 General Method of propagation:
    Autorun feature


Aliases:
   •  Mcafee: W32/VBNA.worm
   •  Sophos: W32/Autorun-AZH
   •  Panda: Trj/Downloader.XOF
   •  Eset: Win32/AutoRun.VB.LJ
   •  Bitdefender: Trojan.VB.Chinky.AD


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Lowers security settings
   • Registry modification

 Files The following files are created:

%drive%\Passwords .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\New Folder .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\Pictures .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\Video .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\Documents .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\Music .lnk This is a non malicious text file with the following content:
   • %code that runs malware%

%drive%\luirih.scr Further investigation pointed out that this file is malware, too. Detected as: TR/Chinky.X

%HOME%\luirih.exe Further investigation pointed out that this file is malware, too. Detected as: TR/Chinky.X

%drive%\luirih.exe Further investigation pointed out that this file is malware, too. Detected as: TR/Chinky.X




It tries to executes the following file:

Filename:
   • "%HOME%\luirih.exe"

 Registry The following registry key is added in order to run the process after reboot:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "luirih"="%HOME%\luirih.exe"



The following registry keys are changed:

Various Explorer settings:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
   Shell Folders]
   New value:
   • "Common Desktop"="%ALLUSERSPROFILE%\Desktop"
   • "Common Documents"="%ALLUSERSPROFILE%\Documents"
   • "Common Start Menu"="%ALLUSERSPROFILE%\Start Menu"
   • "CommonMusic"="%ALLUSERSPROFILE%\Documents\My Music"
   • "CommonPictures"="%ALLUSERSPROFILE%\Documents\My Pictures"
   • "CommonVideo"="%ALLUSERSPROFILE%\Documents\My Videos"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
   New value:
   • "ShowSuperHidden"=dword:0x00000000

 Backdoor The following port is opened:

ns2.the**********.net on TCP port 8002

 Injection – It injects a backdoor routine into a process.

It is injected into all processes.


 File details Programming language:
The malware program was written in Visual Basic.


Encryption:
Encrypted - The virus code inside the file is encrypted.

Polymorphic - The entire virus code changes from one infection to another. The virus contains a polymorphic engine.

Description inserted by Petre Galan on Wednesday, May 12, 2010
Description updated by Petre Galan on Wednesday, May 12, 2010

Back . . . .