Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Jorik.DB
Date discovered:02/09/2012
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:99840 Bytes
MD5 checksum:d3c5f3cd35cbd49444f02e3ef3817adb
VDF version:7.11.41.144 - Sunday, September 2, 2012
IVDF version:7.11.41.144 - Sunday, September 2, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan.Win32.Bublik.gpm
   •  Sophos: Troj/Mdrop-ENN
   •  Grisoft: Generic29.BSCL
   •  Eset: Win32/Spy.Bebloh.J
     GData: Trojan.Generic.KDV.740694
     DrWeb: Trojan.DownLoader6.57242
     Norman: Trojan W32/Suspicious_Gen4.BDQMI

This is a component of: EXP/Pidief.fcu


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %SYSDIR%\%random character string%.exe

 Registry The following registry keys are added:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
   Image File Execution Options\userinit.exe]
   • "Debugger"="%random character string%.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\
   5.0\72C64769\]

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • task**********re.net

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Wensin Lee on Friday, September 28, 2012
Description updated by Wensin Lee on Friday, September 28, 2012

Back . . . .