Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/FakeAV.13.8
Date discovered:17/04/2011
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:221.184 Bytes
MD5 checksum:27D7154A5CC03652101F6DD874FE792C
VDF version:7.11.06.144 - Sunday, April 17, 2011
IVDF version:7.11.06.144 - Sunday, April 17, 2011

 General Aliases:
   •  TrendMicro: BKDR_RUSKILL.AU
   •  Sophos: Troj/Agent-SKW
   •  Microsoft: Worm:Win32/Dorkbot.A


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\%random character string%.exe



It deletes the initially executed copy of itself.

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "%random character string%"="%APPDATA%\%random character string%.exe"

 Backdoor Contact server:
The following:
   • **********.a7aneek.net:3212


 Injection – It injects itself as a remote thread into a process.

    All of the following processes:
   • %WINDIR%\explorer.exe
   • %SYSDIR%\csrss.exe
   • %SYSDIR%\services.exe
   • %SYSDIR%\smss.exe
   • %SYSDIR%\spoolsv.exe
   • %SYSDIR%\svchost.exe
   • %SYSDIR%\winlogon.exe


 Miscellaneous Accesses internet resources:
   • api.wipmania.com

Description inserted by Andrei Ilie on Tuesday, September 27, 2011
Description updated by Andrei Ilie on Thursday, September 29, 2011

Back . . . .