Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/LockScreen.BO.13
Date discovered:13/01/2012
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:346.624 Bytes
MD5 checksum:79615C5DC40F4F92E9BCEF07267B6D29
VDF version:7.11.21.10 - Friday, January 13, 2012
IVDF version:7.11.21.10 - Friday, January 13, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Downloader.Win32.Dapato.bsf
   •  Bitdefender: Trojan.Agent.ATVF
   •  Microsoft: Trojan:Win32/LockScreen.BO
   •  GData: Trojan.Agent.ATVF


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Downloads files
   • Drops files
   • Falsely reports malware infection or system problems and offers to fix them if the user buys the application.
   • Registry modification

 Files The following file is created:

– Non malicious file:
   • C:\%malware execution directory%\dwlGina3.dll

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Yd92ZRE9ASh2qtG"="%APPDATA%\rx5iur6idx.exe"

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Yd92ZRE9ASh2qtG"="%APPDATA%\rx5iur6idx.exe"

– [HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Shell"="%APPDATA%\rx5iur6idx.exe"

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Shell"="%APPDATA%\rx5iur6idx.exe"



The following registry key is added:

– [HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
   {zO6GMBsG-P0Lu-m6zG-Rn2O-mEvWgcvpFNqQ}]
   • "Yd92ZRE9ASh2qtG"="\"%APPDATA%\rx5iur6idx.exe\" /ActiveX"



The following registry key is changed:

Disable Regedit and Task Manager:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
   New value:
   • "DisableTaskMgr"="1"
   • "DisableRegistryTools"=dword:00000001

 File details Programming language:
The malware program was written in Delphi.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Jan-Eric Herting on Wednesday, January 18, 2012
Description updated by Jan-Eric Herting on Wednesday, January 18, 2012

Back . . . .