Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:20/07/2007
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:192.512 Bytes
MD5 checksum:13a8c59530b167823aaf7254eaed6125
VDF version:
IVDF version: - Friday, July 20, 2007

 General Method of propagation:
   • Autorun feature

   •  Mcafee: FakeRecycled
   •  Kaspersky: Worm.Win32.VB.xb
   •  Bitdefender: Trojan.VB.FakeRecycled.C
   •  Panda: Trj/FakeRecycle.B
   •  GData: Trojan.VB.FakeRecycled.C

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Drops malicious files

 Files It copies itself to the following location:
   • %drive%\trpoz.exe

It copies itself to the following location. This file has random bytes appended or changed so it may differ from the original one:
   • %HOME%\trpoz.exe

The following file is created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

It tries to execute the following file:

– Filename:
   • %HOME%\trpoz.exe

 Backdoor Contact server:
The following:
   • ns1.cod**********.biz:8003 (TCP)

 Injection – It injects a backdoor routine into a process.

It is injected into all processes.

 Miscellaneous Mutex:
It creates the following Mutex:
   • A

 File details Programming language:
The malware program was written in Visual Basic.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Thursday, April 7, 2011
Description updated by Petre Galan on Thursday, April 7, 2011

Back . . . .