Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Ransom.PornoAsset.fs
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:26.112 Bytes
MD5 checksum:5ebac09dc2625880b8cf0f7cc5f6fbfb

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Ransom.Win32.PornoAsset.fs
   •  F-Secure: Trojan-Ransom.Win32.PornoAsset.fs
   •  Sophos: Mal/Zbot-CX
   •  Bitdefender: Gen:Variant.Kazy.24439
   •  AVG: Generic22.CEWE
   •  Grisoft: Generic22.CEWE
   •  Eset: Win32/LockScreen.AGD


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Drops a file
   • Registry modification


Right after execution the following information is displayed:


 Files It copies itself to the following location:
   • %ALLUSERSPROFILE%\Application Data\%eight-digit random character string%.exe



It renames the following file:

    •  %malware execution directory%\sample.exe into %ALLUSERSPROFILE%\Application Data\%11 digit random character string%.exe



The following file is created:

%SYSDIR%\%eight-digit random character string%.exe

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Shell"="%ALLUSERSPROFILE%\Application Data\%eight-digit random character string%.exe"

 Process termination The following process is terminated:
   • %WINDIR%\explorer.exe


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Jason Soo on Friday, June 10, 2011
Description updated by Jason Soo on Friday, June 10, 2011

Back . . . .