¿Necesita ayuda? Pregunte a la comunidad o contrate a un experto.
Ir a Avira Answers
Virus:Worm/Autorun.737280
Date discovered:21/02/2012
Type:Worm
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:734001 Bytes
MD5 checksum:384859f845d91158a374d21db5d61b24
VDF version:7.11.23.192 - Tuesday, February 21, 2012
IVDF version:7.11.23.192 - Tuesday, February 21, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Worm.Win32.AutoRun.esf
   •  Sophos: W32/AutoRun-AOA
   •  Bitdefender: Trojan.Generic.4014236
     Microsoft: Trojan:Win32/Malagent
   •  Grisoft: Generic2_c.ABXH
   •  Eset: multiple threats
     GData: Trojan.Generic.4014236
     DrWeb: Win32.HLLW.Autoruner.6522


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Side effects:
    Can be used to modify system settings that allow or augment potential malware behaviour.
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\chrome.exe
   • %WINDIR%\chrome.exe

 Registry The following registry keys are added in order to load the services after reboot:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Yahoo Messengger"="c:\windows\\system32\\chrome.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
   • "NofolderOptions"=dword:00000001

[HKLM\SYSTEM\ControlSet001\Services\Schedule]
   • "AtTaskMaxHours"=dword:00000000

[HKCU\Software\Microsoft\Internet Explorer\Main]
   • "RunOnceComplete"=dword:00000001
   • "RunOnceHasShown"=dword:00000001



The following registry keys are added:

[HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\Control Panel]
   • "HomePage"=dword:00000001

[HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel]
   • "HomePage"=dword:00000001



The following registry keys are changed:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   Old value:
   • "Shell"="Explorer.exe"
   New value:
   • "Shell"="Explorer.exe chrome.exe"

Internet Explorer's start page:

[HKLM\SOFTWARE\Microsoft\Internet Explorer\Main]
   Old value:
   • "Default_Page_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome"
   • "Default_Search_URL"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
   • "Search Page"="http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch"
   • "Start Page"="http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home"
   New value:
   • "Default_Page_URL"="http://www.todaygoogle.com/"
   • "Default_Search_URL"="http://www.todaygoogle.com/"
   • "Search Page"="http://www.todaygoogle.com/"
   • "Start Page"="http://www.todaygoogle.com/"
   • "RunOnceComplete"=dword:00000001
   • "RunOnceHasShown"=dword:00000001

Internet Explorer's start page:

[HKCU\Software\Microsoft\Internet Explorer\Main]
   Old value:
   • "Start Page"="about:blank"
   •
   New value:
   • "Start Page"="http://www.todaygoogle.com/"
   •

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • h1.**********.com


Event handler:
It creates the following Event handlers:
   • GetKeyState
   • GetAsyncKeyState
   • HttpSendRequest
   • FtpOpenFile
   • InternetOpenUrl
   • InternetOpen
   • GetDriveType
   • CreateFile
   • ShellExecute

Descripción insertada por Wensin Lee el lunes 9 de abril de 2012
Descripción actualizada por Wensin Lee el lunes 9 de abril de 2012

Volver . . . .
https:// Esta ventana está cifrada para su seguridad.