Need help? Ask the community or hire an expert.
Go to Avira Answers
Nume:TR/Reveton.A.153
Descoperit pe data de:11/01/2012
Tip:Troian
ITW:Nu
Numar infectii raportate:Scazut
Potential de raspandire:Scazut
Potential de distrugere:Scazut
Marime:210.432 Bytes
MD5:056AB8CB1536D2282D77F828A6EDDFDE
Versiune VDF:7.11.20.228 - miercuri, 11 ianuarie 2012
Versiune IVDF:7.11.20.228 - miercuri, 11 ianuarie 2012

 General Metoda de raspandire:
   • Nu are rutina proprie de raspandire


Alias:
   •  Microsoft: Trojan:Win32/Reveton.A
   •  Grisoft: PSW.Agent.ASJL


Sistem de operare:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Efecte secundare:
   • Descarca un fisier
   • Raporteaza probleme de sistem sau infectii malware inexistente si se ofera sa le repare daca utilizatorul cumpara aplicatia.
   • Modificari in registri

 Fisiere Este creat fisierul:

– Fisier inofensiv:
   •  %HOME%\Startmenü\Programme\Autostart\virus.dll.lnk

 Registrii sistemului Urmatoarele chei din registri sunt modificate:

Dezactivarea programelor Regedit si Task Manager:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
   Noua valoare:
   • "DisableTaskMgr"=dword:00000001

Reduce setarile de securitate din Internet Explorer:

– [HKCU\Software\Microsoft\Internet Explorer\Main]
   Noua valoare:
   • "NoProtectedModeBanner"=dword:00000001

Reduce setarile de securitate din Internet Explorer:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\
   {E19ADC6E-3909-43E4-9A89-B7B676377EE3}\iexplore]
   Noua valoare:
   • "Type"=dword:00000004
   • "Count"=dword:00000007
   • "Time"=hex:db,07,09,00,02,00,06,00,09,00,35,00,01,00,38,01

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\
   {E2E2DD38-D088-4134-82B7-F2BA38496583}\iexplore]
   Noua valoare:
   • "Type"=dword:00000004
   • "Count"=dword:00000015
   • "Time"=hex:db,07,09,00,02,00,06,00,09,00,35,00,01,00,38,01

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\
   {FB5F1910-F110-11D2-BB9E-00C04F795683}\iexplore]
   Noua valoare:
   • "Type"=dword:00000004
   • "Count"=dword:00000016
   • "Time"=hex:db,07,09,00,02,00,06,00,09,00,35,00,01,00,38,01

 Injectarea codului malware in alte procese – Se injecteaza ca un thread remote in procese.

    Urmatoarele procese:
   • notepad.exe
   • iexplorer.exe


 Detaliile fisierului Compresia fisierului:
Pentru a ingreuna detectia si a reduce marimea fisierului, este folosit urmatorul program de arhivare:
   • UPX

Description inserted by Jan-Eric Herting on Wednesday, January 18, 2012
Description updated by Jan-Eric Herting on Wednesday, January 18, 2012

Back . . . .