Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:RKit/Agent.deoh
Date discovered:13/07/2012
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low
File size:6.400 Bytes
MD5 checksum:f48ec0c212f2a39dbb1ac08383cbaa9f
VDF version:7.11.36.22 - Friday, July 13, 2012
IVDF version:7.11.36.22 - Friday, July 13, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Rootkit.Win32.Agent.deoh
   •  Avast: Win32:Agent-AOTK


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Registry modification

 Registry The following registry keys are added:

– [HKLM\SYSTEM\ControlSet001\Services\
   %executed file's name without extension%]
   • ""=""
   • "DisplayName"="%executed file's name without extension%"

– [HKLM\SYSTEM\ControlSet001\Services\
   %executed file's name without extension%\Enum]
   • ""=""
   • "Count"="dword:0x00000000"
   • "INITSTARTFAILED"="dword:0x00000001"
   • "NextInstance"="dword:0x00000000"

– [HKLM\SYSTEM\ControlSet001\Services\
   %executed file's name without extension%]
   • "ErrorControl"="dword:0x00000001"
   • "ImagePath"="\??\%directory name%\%executed file%"

– [HKLM\SYSTEM\ControlSet001\Services\
   %executed file's name without extension%\Security]
   • ""=""
   • "Security"="hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • ,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,\
   • ,00,00,01,00,00,00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,\
   • ,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,00,00,18,00,ff,\
   • ,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
   • ,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • ,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
   • ,02,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,\
   • ,00,00,05,12,00,00,00"

– [HKLM\SYSTEM\ControlSet001\Services\
   %executed file's name without extension%]
   • "Start"="dword:0x00000003"
   • "Type"="dword:0x00000001"

– [HKLM\SYSTEM\CurrentControlSet\Services\
   %executed file's name without extension%]
   • ""=""
   • "DisplayName"="%executed file's name without extension%"

– [HKLM\SYSTEM\CurrentControlSet\Services\
   %executed file's name without extension%\Enum]
   • ""=""
   • "Count"="dword:0x00000000"
   • "INITSTARTFAILED"="dword:0x00000001"
   • "NextInstance"="dword:0x00000000"

– [HKLM\SYSTEM\CurrentControlSet\Services\
   %executed file's name without extension%]
   • "ErrorControl"="dword:0x00000001"
   • "ImagePath"="\??\%directory name%\%executed file%"

– [HKLM\SYSTEM\CurrentControlSet\Services\
   %executed file's name without extension%\Security]
   • ""=""
   • "Security"="hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,\
   • ,00,1c,00,01,00,00,00,02,80,14,00,ff,01,0f,00,01,01,00,00,00,\
   • ,00,00,01,00,00,00,00,02,00,60,00,04,00,00,00,00,00,14,00,fd,\
   • ,01,02,00,01,01,00,00,00,00,00,05,12,00,00,00,00,00,18,00,ff,\
   • ,01,0f,00,01,02,00,00,00,00,00,05,20,00,00,00,20,02,00,00,00,\
   • ,00,14,00,8d,01,02,00,01,01,00,00,00,00,00,05,0b,00,00,00,00,\
   • ,00,18,00,fd,01,02,00,01,02,00,00,00,00,00,05,20,00,00,00,23,\
   • ,02,00,00,01,01,00,00,00,00,00,05,12,00,00,00,01,01,00,00,00,\
   • ,00,00,05,12,00,00,00"

– [HKLM\SYSTEM\CurrentControlSet\Services\
   %executed file's name without extension%]
   • "Start"="dword:0x00000003"
   • "Type"="dword:0x00000001"

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Martin Muench on Saturday, July 14, 2012
Description updated by Martin Muench on Saturday, July 14, 2012

Back . . . .