Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:08/10/2012
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:58368 Bytes
MD5 checksum:b6d93bdafac4aeb0b02f2c71e5b1fd49
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan-Ransom.Win32.Gimemo.arqg
   •  Sophos: Troj/Agent-YCB
   •  Eset: Win32/TrojanDownloader.Zortob.B trojan
   •  DrWeb: BackDoor.Kuluoz.3

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %appdata%\%eight-digit random character string%.exe

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "jfgsmslk"=""%appdata%\%eight-digit random character string%""

The following registry key is added:

– [HKCU\Software\xcqahuiu]

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • 217.**********.**********.108:84/get/passf_v4_2.dll.crp

Event handler:
It creates the following Event handlers:
   • URLDownloadToFile
   • CreateProcess
   • Createfile

Furthermore it contains the following string:
   • You fag!!!!!

Description inserted by Wensin Lee on Tuesday, October 9, 2012
Description updated by Wensin Lee on Tuesday, October 9, 2012

Back . . . .