Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Agent.90112.BD
Date discovered:16/07/2008
Type:Trojan
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:89.088 Bytes
MD5 checksum:7b939100f7585fd7e08be6236b03de24
VDF version:7.00.05.117
IVDF version:7.00.05.126 - Wednesday, July 16, 2008

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Kaspersky: Trojan-Spy.Win32.SpyEyes.gin
   •  F-Secure: Trojan-Spy.Win32.SpyEyes.gin
   •  Bitdefender: Trojan.Generic.5572357
   •  GData: Trojan.Generic.5572357
   •  DrWeb: Win32.HLLW.Autoruner.49725


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %drive%\svrwsc.exe
   • %SYSDIR%\svrwsc.exe



It deletes the initially executed copy of itself.



It deletes the following file:
   • %TEMPDIR%\Low%four-digit random character string%.tmp.bat



The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%TEMPDIR%\Low%four-digit random character string%.tmp.bat Furthermore it gets executed after it was fully created. This batch file is used to delete a file.



It tries to execute the following file:

– Filename:
   • %SYSDIR%\cmd.exe" /c "%TEMPDIR%\Low%four-digit random character string%.tmp.bat

 Registry The following registry key is added in order to run the process after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "SvrWsc"=""



The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\SvrWsc]
   • "Description"="The service provides COM APIs for independent software vendors to register and record the state of their products to the Security Center service."
   • "DisplayName"="Windows Security Center Service"
   • "ErrorControl"=dword:0x00000000
   • "ImagePath"="%SYSDIR%\svrwsc.exe"
   • "ObjectName"="LocalSystem"
   • "Start"=dword:0x00000002
   • "Type"=dword:0x00000010



The following registry keys are added:

– [HKLM\Software\Microsoft\DirectX\MSB]
   • "X1"=hex:00

– [HKLM\Software\Microsoft\DirectX\MSA]
   • "X1"=hex:AE,2C,CC,01,16,21,60,C9
   • "X2"=hex:00

 Miscellaneous Accesses internet resources:
   • http://cnewsus.ru/naol/news/**********


Mutex:
It creates the following Mutexes:
   • PROCESS_MI_4:c
   • PROCESS_MT_4:c

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Friday, June 17, 2011
Description updated by Petre Galan on Friday, June 17, 2011

Back . . . .