PCの修理が必要ですか?
専門家に頼む
Virus:TR/Flamer.A
Date discovered:29/05/2012
Type:Trojan
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:6.166.528 Bytes
MD5 checksum:BDC9E04388BDA8527B398A8C34667E18
VDF version:7.11.31.80 - Tuesday, May 29, 2012
IVDF version:7.11.31.80 - Tuesday, May 29, 2012

 General Methods of propagation:
   • Email
   • Local network


Aliases:
   •  Kaspersky: Worm.Win32.Flame.A
   •  TrendMicro: WORM_FLAMER.A
   •  F-Secure: Trojan.Flame.A
   •  Bitdefender: Trojan.Flame.A
   •  Eset: Win32/Flamer.A
     GData: Trojan.Flame.A
     DrWeb: Win32.HLLW.Flame.1


Platforms / OS:
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7


Side effects:
    Can be used to execute malicious code
   • Drops malicious files
   • Records keystrokes
   • Registry modification
   • Steals information

 Files It copies itself to the following location:
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\wavesup3.drv



The following files are created:

Non malicious files:
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSSecurityMgr\mscrypt.dat
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\wpgfilter.dat
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\audcache
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\audfilter.dat
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\lmcache.dat
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\ntcache.dat
   • %PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\dstrlog.dat

%SYSDIR%\nteps32.ocx Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: Worm/Flame.A

%SYSDIR%\advnetcfg.ocx Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Flamer.A.4

%SYSDIR%\msglu32.ocx Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Flame.B

%SYSDIR%\soapr32.ocx Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Flamer.A.5

%SYSDIR%\boot32drv.sys Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Flamer.A.7

%SYSDIR%\ccalc32.sys Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Flamer.A.8

 Registry The following registry key is added in order to run the process after reboot:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32]
   • "wave9"="%PROGRAM FILES%\Common Files\Microsoft Shared\MSAudio\wavesup3.drv"

説明の挿入者 Eric Burk の 2012年5月29日火曜日
説明の更新者 Eric Burk の 2012年5月30日水曜日

戻る . . . .
https:// このウィンドウは暗号化されています。