Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Boinberg.A.90
Date discovered:24/06/2011
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low to medium
File size:1.265.664 Bytes
MD5 checksum:AE2D62EDAD6033A4BDD7D993DB7AA1DD
VDF version:7.11.10.83 - Friday, June 24, 2011
IVDF version:7.11.10.83 - Friday, June 24, 2011

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Kaspersky: Trojan.Win32.VBKrypt.ekin
   •  TrendMicro: WORM_VBNA.YRT
   •  DrWeb: Trojan.DownLoader3.58094


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following locations:
   • %APPDATA%\%number%.exe
   • %APPDATA%\hsced\ahBwf.exe

 Registry To each registry key one of the values is added in order to run the processes after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "SystemRem"="%APPDATA%\%number%.exe"

–  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "SystemRem"="%APPDATA%\%number%.exe"

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "svchost"="%APPDATA%\hsced\ahBwf.exe"

 Miscellaneous Mutex:
It creates the following Mutex:
   • __PDH_PLA_MUTEX__

Description inserted by Andrei Ilie on Wednesday, August 31, 2011
Description updated by Andrei Ilie on Thursday, September 1, 2011

Back . . . .