Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:WORM/Hamweq.A.152
Date discovered:04/07/2011
Type:Worm
In the wild:No
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:45.056 Bytes
MD5 checksum:92D4073A3AE551192626351C419AF423
VDF version:7.11.10.205 - Monday, July 4, 2011
IVDF version:7.11.10.205 - Monday, July 4, 2011

 General Method of propagation:
    Autorun feature


Aliases:
   •  Kaspersky: Trojan.Win32.Pincav.bgui
   •  Bitdefender: Trojan.Downloader.JJRI
     Microsoft: Worm:Win32/Hamweq.A


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %recycle bin%\S-1-5-21-1482476501-1644491937-682003330-1013\vsounds.exe



The following file is created:

%recycle bin%\S-1-5-21-1482476501-1644491937-682003330-1013\Desktop.ini

 Registry The following registry key is added:

[HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
   {28ABC5C0-4FCB-11CF-AAX5-81CX1C635612}]
   • "StubPath"="%recycle bin%\S-1-5-21-1482476501-1644491937-682003330-1013\vsounds.exe"

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: **********eb.nad123nad.com
Port: 1122
Nickname: %random character string%



 This malware has the ability to collect and send information such as:
    • Username
    • Information about the Windows operating system


 Furthermore it has the ability to perform actions such as:
     connect to IRC server
     disconnect from IRC server
    • Join IRC channel
    • Leave IRC channel

 Injection It injects itself as a remote thread into a process.

    Process name:
   • explorer.exe


 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Andrei Ilie on Wednesday, October 12, 2011
Description updated by Andrei Ilie on Thursday, October 13, 2011

Back . . . .