Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Rogue.kdv.636704.1
Date discovered:01/06/2012
Type:Trojan
In the wild:Yes
Reported Infections:High
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:333.280 Bytes
MD5 checksum:7739b44903784e044025befedba141a7
VDF version:7.11.31.170 - Friday, June 1, 2012
IVDF version:7.11.31.170 - Friday, June 1, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan-Spy.Win32.Farko.le
   •  Avast: Win32:Agent-AOMJ
   •  Eset: Win32/Spy.Banker.XUT


Platforms / OS:
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Records keystrokes
   • Registry modification
   • Steals information

 Registry It registers a browser helper object (BHO) by adding the following keys:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
   Browser Helper Objects\%CLSID%]
   • @="Adobe PDF Reader Link Helper"
   • "NoExplorer"=dword:00000001

– [HKLM\SOFTWARE\Classes\CLSID\
   {F99BD4F5-D402-4c21-A8BC-510830B6BE37}]
   • @="Adobe PDF Reader Link Helper"
   • "AppID"="%CLSID%"

– [HKLM\SOFTWARE\Classes\CLSID\%CLSID%\InprocServer32]
   • @="%malware dll%"
   • "ThreadingModel"="Apartment"

– [HKLM\SOFTWARE\Classes\CLSID\%CLSID%\ProgID]
   • @="linkrdr.AIEbho.1"

– [HKLM\SOFTWARE\Classes\CLSID\%CLSID%\TypeLib]
   • @="%CLSID%"

– [HKLM\SOFTWARE\Classes\CLSID\%CLSID%\
   VersionIndependentProgID]
   • @="linkrdr.AIEbho"

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Alexander Bauer on Saturday, June 2, 2012
Description updated by Alexander Bauer on Saturday, June 2, 2012

Back . . . .