Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Cossta.dwk
Date discovered:10/05/2010
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low
Static file:Yes
File size:86.016 Bytes
MD5 checksum:25297cac62540119709f7f671b0937a6
IVDF version:7.10.03.05

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Sophos: Mal/VB-GI
   •  Bitdefender: Trojan.Generic.3265719
   •  Panda: W32/Autorun.JZA


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following locations:
   • %drive%\RECYCLER\winlogon.exe
   • %HOME%\Start Menu\Programs\Startup\winlogon.exe



The following file is created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%




It tries to executes the following file:

– Filename:
   • "%HOME%\Start Menu\Programs\Startup\winlogon.exe"

 Registry The following registry key is added in order to run the process after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "System"="%HOME%\Start Menu\Programs\Startup\winlogon.exe"

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Wednesday, August 25, 2010
Description updated by Andrei Ivanes on Friday, August 27, 2010

Back . . . .