Ha bisogno di assistenza? Chieda alla community oppure consulti un esperto.
Vai ad Avira Answers
Date discovered:20/07/2011
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
File size:69.632 Bytes
MD5 checksum:9268ADEBF4F49D16DA0838145E8BA4D5
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: W32.SillyIRC
   •  Mcafee: W32/Autorun.worm.h
   •  Kaspersky: Worm.Win32.AutoRun.cgfa

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7

Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %TEMPDIR%\%random character string%.exe

It deletes the initially executed copy of itself.

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows"="%TEMPDIR%\%random character string%.exe"

–  [HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
   • "StubPath"="C:\DOCUME~1\SD_USER\LOCALS~1\Temp\%random character string%.exe"

The following registry key is added:

– [HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\
   Internet Settings]
   • "ProxyEnable"=dword:00000000

 Backdoor The following port is opened:

– svchost.exe on UDP port 1032

Contact server:
The following:
   • 69.65.19.**********:443

As a result it may send information and remote control could be provided.

Sends information about:
    • Information about the Windows operating system

Remote control capabilities:
    • Send emails

 Injection – It injects itself as a remote thread into a process.

    Process name:
   • explorer.exe

 File details Programming language:
The malware program was written in Visual Basic.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Descrizione inserita da Andrei Ilie su lunedì 1 agosto 2011
Descrizione aggiornata da Andrei Ilie su martedì 2 agosto 2011

Indietro . . . .