Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/Spyeye.AK
Descoperit pe data de:19/04/2011
Tip:Troian
ITW:Da
Numar infectii raportate:Scazut spre mediu
Potential de raspandire:Scazut
Potential de distrugere:Scazut spre mediu
Fisier static:Da
Marime:169.472 Bytes
MD5:d86475833d1edf6838acade9827f42f2
Versiune VDF:7.11.06.187 - marți, 19 aprilie 2011
Versiune IVDF:7.11.06.187 - marți, 19 aprilie 2011

 General Alias:
   •  Mcafee: PWS-Spyeye
   •  Kaspersky: Trojan.Win32.Jorik.SpyEyes.il
   •  Bitdefender: Win32.Worm.Rimecud.BL
   •  GData: Win32.Worm.Rimecud.BL


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003


Efecte secundare:
   • Creeaza fisiere malware
   • Modificari in registri
   • Sustrage informatii

 Fisiere Se copiaza in urmatoarea locatie:
   • C:\mssm\mssm.exe



Sterge copia initiala a virusului.



Este creat fisierul:

– C:\mssm\config.bin



Incearca se execute urmatorul fisier:

– Numele fisierului:
   • C:\mssm\mssm.exe

 Registrii sistemului Urmatoarea cheie este adaugata in registri pentru a rula procesul la repornirea sistemului:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "mssm.exe"="C:\mssm\mssm.exe"



Valorile urmatoarei chei sunt sterse din registrii sistemului:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   • AutoConfigURL
   • ProxyOverride
   • ProxyServer



Urmatoarele chei sunt adaugate in registrii sistemului:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   • "GlobalUserOffline"=dword:0x00000000
   • "WarnOnIntranet"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\0]
   • "1409"=dword:0x00000003

– [HKCU\Software\Microsoft\Internet Explorer\PhishingFilter]
   • "ShownServiceDownBalloon"=dword:0x00000000

– [HKCU\Software\Microsoft\Internet Explorer\Recovery]
   • "ClearBrowsingHistoryOnExit"=dword:0x00000000



Urmatoarele chei din registri sunt modificate:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\1]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

– [HKCU\Software\Microsoft\Internet Explorer\PhishingFilter]
   Noua valoare:
   • "EnabledV8"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\0]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1609"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\2]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\4]
   Noua valoare:
   • "1406"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\1]
   Noua valoare:
   • "1406"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\2]
   Noua valoare:
   • "1406"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Lockdown_Zones\3]
   Noua valoare:
   • "1406"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
   Noua valoare:
   • "EnableHttp1_1"=dword:0x00000001
   • "MigrateProxy"=dword:0x00000001
   • "ProxyEnable"=dword:0x00000000
   • "ProxyHttp1.1"=dword:0x00000001
   • "WarnOnPost"=hex:00,00,00,00
   • "WarnOnPostRedirect"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\3]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\
   Zones\4]
   Noua valoare:
   • "1406"=dword:0x00000000
   • "1409"=dword:0x00000003
   • "1609"=dword:0x00000000

 Backdoor Servere contactate:
Urmatoarele:
   • cos**********.asia:8080 (TCP)
   • http://cosmar-goiano.asia/gdr/**********?guid=%sir de caractere%&ver=%numar%&ie=%sir de caractere%&os=%sir de caractere%&ut=%sir de caractere%&ccrc=%sir de caractere%&md5=%sir de caractere%&plg=%sir de caractere%&stat=%sir de caractere%


 Furt de informatii Incearca sa obtina urmatoarele informatii:
– Parole stocate, folosite de functia AutoComplete

– Parolele din urmatoarele programe:
   • Mozilla Firefox
   • Internet Explorer

 Injectarea codului malware in alte procese – Se injecteaza ca un thread remote intr-un proces.

    Numele procesului:
   • explorer.exe



– Se injecteaza ca un thread remote intr-un proces.

Este injectat in toate procesele.


 Alte informatii  Cauta o conexiune Internet, contactand urmatorul website:
   • http://www.microsoft.com/


Mutex:
Creeaza urmatorul mutex:
   • BoHjj8VTUUgUUUuuUuTFvDFYeJxCK

 Detaliile fisierului Limbaj de programare:
Limbaj de programare folosit: C (compilat cu Microsoft Visual C++).


Compresia fisierului:
Pentru a ingreuna detectia si a reduce marimea fisierului, este folosit un program de compresie runtime.

Description inserted by Petre Galan on Wednesday, July 13, 2011
Description updated by Petre Galan on Wednesday, July 13, 2011

Back . . . .