Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Boinberg.A.89
Date discovered:24/06/2011
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Medium to high
Damage Potential:Medium
File size:98.304 Bytes
MD5 checksum:30AB94BFE4F5D4ADA2483F760341BD42
VDF version:7.11.10.83 - Friday, June 24, 2011
IVDF version:7.11.10.83 - Friday, June 24, 2011

 General Methods of propagation:
   • Autorun feature
   • Messenger


Aliases:
   •  Mcafee: W32/Autorun.worm.h
   •  Kaspersky: Trojan.Win32.Jorik.Drefir.at
   •  TrendMicro: TROJ_JORIK.WRH


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Third party control
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\%number%.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "SystemRem"="%APPDATA%\%number%.exe"

–  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "SystemRem"="%APPDATA%\%number%.exe"

 Messenger It is spreading via Messenger. The characteristics are described below:

– Windows Live Messenger

 Backdoor Remote control capabilities:
    • Download file
    • Perform DDoS attack
    • Start spreading routine
    • Visit a website

 Miscellaneous  Checks for an internet connection by contacting the following web site:
   • http://www.geobytes.com/iplocator.htm

 File details Programming language:
The malware program was written in Visual Basic.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Andrei Ilie on Monday, August 1, 2011
Description updated by Andrei Ilie on Wednesday, August 3, 2011

Back . . . .