Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Malagent.A.1112
Date discovered:10/05/2010
Type:Trojan
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:77.824 Bytes
MD5 checksum:8D3FC62821C436169249EA5E09C53C5D
VDF version:7.10.03.05
IVDF version:7.10.07.72 - Monday, May 10, 2010

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  TrendMicro: TROJ_DIPLE.FL
   •  Sophos: Troj/Diple-A
     Microsoft: Trojan:Win32/Malagent


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\windows.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Login access"="%APPDATA%\windows.exe"

  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Login access"="%APPDATA%\windows.exe"



The following registry key is added:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion]
   • "Start Page"="http://redirecturls.info/"



The following registry key is changed:

Internet Explorer's start page:

[HKCU\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Start Page"="http://redirecturls.info/"

 Miscellaneous Mutex:
It creates the following Mutex:
   • WeAreWeAre

Description inserted by Andrei Ilie on Tuesday, September 6, 2011
Description updated by Andrei Ilie on Tuesday, September 6, 2011

Back . . . .