Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:27/10/2010
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:92.672 Bytes
MD5 checksum:074183cd048fbf01163d14d621fa73e4
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Downloader
   •  Kaspersky: Worm.Win32.Bybz.cza
   •  TrendMicro: WORM_OTORUN.FJE
   •  Avast: Win32:Inject-ACU

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7

Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\Microsoft\service.exe

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "service"="%APPDATA%\Microsoft\service.exe"

 Stealing It tries to steal the following information:
– Recorded passwords used by the AutoComplete function

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • anon.dyndns.**********

Description inserted by Andrei Ilie on Tuesday, February 22, 2011
Description updated by Andrei Ilie on Friday, February 25, 2011

Back . . . .