Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Crypt.cfi.56
Date discovered:09/08/2013
Type:Trojan
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:480.376 Bytes
MD5 checksum:D0F52960AE4F2B30008F7CE7F115095D
VDF version:7.11.95.246 - Friday, August 9, 2013
IVDF version:7.11.95.246 - Friday, August 9, 2013

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Trojan.Win32.Staser.rrj
   •  Sophos: Mal/Behav-363


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

 Files It copies itself to the following location:
   • %ALLUSERSPROFILE%\Application Data\eSafe\eGdpSvc.exe



The following file is created:

– Non malicious file:
   • %ALLUSERSPROFILE%\Application Data\eSafe\log\eGdpSvc.LOG

 Registry The following registry keys are added:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
   WsysControl]
   • "DisplayName"="Wsys Control 10.2.1.2634"
   • "DisplayVersion"="10.2.1.2634"
   • "publisher"="Wsys Co., Ltd."
   • "UninstallString"="C:\Documents and Settings\\All Users\\Application Data\\eSafe\\eGdpSvc.exe -unsvc"
   • "DisplayIcon"="C:\Documents and Settings\\All Users\\Application Data\\eSafe\\eGdpSvc.exe"

– [HKLM\SOFTWARE\eSafeSecControl]
   • "sid"="eGdp"
   • "channel"="eGdp"
   • "pid"="eSafe"
   • "ver"="10.2.1.2634"

– [HKLM\SYSTEM\ControlSet001\Services\WsysSvc]
   • "Type"=dword:00000010
   • "Start"=dword:00000002
   • "ErrorControl"=dword:00000001
   • "ImagePath"="C:\Documents and Settings\\All Users\\Application Data\\eSafe\\eGdpSvc.exe"
   • "DisplayName"="Wsys Service"
   • "Group"="SchedulerGroup"
   • "ObjectName"="LocalSystem"
   • "Description"="Wsys update service"

– [HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\
   WsysSvc]
– [HKLM\SYSTEM\ControlSet001\Services\Eventlog\Application\WsysSvc]
   • "EventMessageFile"="C:\Documents and Settings\\All Users"
   • "TypesSupported"=dword:00000007

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_WSYSSVC]
   • "NextInstance"=dword:00000001

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_WSYSSVC\0000]
   • "Service"="WsysSvc"
   • "Legacy"=dword:00000001
   • "ConfigFlags"=dword:00000000
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "DeviceDesc"="Wsys Service"

– [HKLM\SYSTEM\ControlSet001\Enum\Root\LEGACY_WSYSSVC\0000\Control]
   • "*NewlyCreated*"=dword:00000000
   • "ActiveService"="WsysSvc"

– [HKLM\SYSTEM\ControlSet001\Services\Eventlog\Application]
   • "Sources"="WsysSvc;WSH;WMIAdapter;WMI.NET Provider Extension;WmdmPmSN;WinMgmt;Winlogon;Windows Product Activation;Windows 3.1 Migration;WebClient;**********"

– [HKLM\SYSTEM\ControlSet001\Services\WsysSvc\Enum]
   • "0"="Root\\LEGACY_WSYSSVC\\0000"
   • "Count"=dword:00000001
   • "NextInstance"=dword:00000001

– [HKLM\SYSTEM\ControlSet001\Control\ServiceCurrent]
   • @=dword:0000000a

– [HKLM\SOFTWARE\eSafeSecControl]
   • "sid"="eGdp"
   • "ver"="10.2.1.2634"



The following registry key is changed:

– [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\
   Winlogon]
   New value:
   • "ParseAutoexec"="1"

 Miscellaneous  Checks for an internet connection by contacting the following web sites:
   • http://xa.x**********d.com/v4/sof-newgdp/**********&update4=ref1,eGdp
   • htp://up.sof.com/gdp/**********00000001

Description inserted by Soe-liang Tan on Wednesday, September 25, 2013
Description updated by Soe-liang Tan on Wednesday, September 25, 2013

Back . . . .