Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:20/04/2010
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:128.000 Bytes
MD5 checksum:193A3BD3F8C6168D5BDF2BFA56B8823C
VDF version:
IVDF version: - Tuesday, April 20, 2010

 General Method of propagation:
    Autorun feature

   •  Symantec: W32.Gammima.AG
   •  Kaspersky: Worm.Win32.AutoRun.bfxw
   •  Eset: Win32/PSW.OnLineGames.OUM
   •  Bitdefender: Trojan.Onlinegames.904

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Drops a malicious file

 Files It copies itself to the following locations:
   • %TEMPDIR%\nodqq.exe
   • %drive%\r3fhr.exe

The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%TEMPDIR%\nodqq%number%.dll Further investigation pointed out that this file is malware, too. Detected as: TR/PSW.Magania.dcmh


 Registry The following registry key is added in order to run the process after reboot:

   • nod32="%TEMPDIR%\nodqq.exe"

The following registry keys are added in order to load the service after reboot:

   • "Type"=dword:00000001
   • "Start"=dword:00000003
   • "ErrorControl"=dword:00000001
   • "ImagePath"=\??\%SYSDIR%\drivers\cdaudio.sys
   • "DisplayName"="AVPsys"

   • "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • 00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,00,00,01,00,00,\
   • 00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,01,02,00,01,01,00,00,00,00,00,\
   • 05,12,00,00,00,00,00,18,00,ff,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,\
   • 20,02,00,00,00,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • 00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,02,00,00,01,01,\
   • 00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,00,00,05,12,00,00,00

   • "Count"=dword:00000000
   • "NextInstance"=dword:00000000
   • "INITSTARTFAILED"=dword:00000001

 Injection – It injects itself into a process.

    Process name:
   • explorer.exe

 File details Programming language:
The malware program was written in MS Visual C++.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Andrei Ivanes on Thursday, June 3, 2010
Description updated by Andrei Ivanes on Thursday, June 3, 2010

Back . . . .