¿Necesita ayuda? Pregunte a la comunidad o contrate a un experto.
Ir a Avira Answers
Date discovered:21/05/2013
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
File size:91136 Bytes
MD5 checksum:8eaa608f72736b4d2428a7bb827457bf
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Sophos: Troj/Agent-ABXB
   •  Bitdefender: Trojan.GenericKDV.1004460
   •  AVG: Crypt.CCQS
   •  Eset: Win32/Gapz.E trojan

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %ALLUSERSPROFILE%\Application Data\%random%.exe

 Registry The following registry key is continuously in an infinite loop added in order to run the process after reboot.

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "%random%"=""%ALLUSERSPROFILE%\Application Data\%random%.exe""

The following registry keys are added in order to load the service after reboot:

– [HKCU\Software\fddbbbaddbddsacfsfdsf]
   • "%random%"=""%ALLUSERSPROFILE%\Application Data\%random%.exe""

 Miscellaneous  Checks for an internet connection by contacting the following web site:
   • r.giga**********umble.biz

Furthermore it contains the following strings:
   • With coming\coolerautumn weathermost\birds[4999].exe
   • smtp://vario**********.nf/best.day?cmon=2be4cool3
   • http://post**********.es//pull

Descripción insertada por Wensin Lee el jueves, 23 de mayo de 2013
Descripción actualizada por Wensin Lee el jueves, 23 de mayo de 2013

Volver . . . .