Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:10/05/2010
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:77.824 Bytes
MD5 checksum:8D3FC62821C436169249EA5E09C53C5D
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  TrendMicro: TROJ_DIPLE.FL
   •  Sophos: Troj/Diple-A
   •  Microsoft: Trojan:Win32/Malagent

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7

Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\windows.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Login access"="%APPDATA%\windows.exe"

–  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Login access"="%APPDATA%\windows.exe"

The following registry key is added:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion]
   • "Start Page"=""

The following registry key is changed:

Internet Explorer's start page:

– [HKCU\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Start Page"=""

 Miscellaneous Mutex:
It creates the following Mutex:
   • WeAreWeAre

Description inserted by Andrei Ilie on Tuesday, September 6, 2011
Description updated by Andrei Ilie on Tuesday, September 6, 2011

Back . . . .