Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Autorun.qog
Date discovered:15/10/2008
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:115.712 Bytes
MD5 checksum:d98951b1923d957de774b123c78330f3
IVDF version:7.00.07.42 - Wednesday, October 15, 2008

 General Aliases:
   •  Mcafee: W32/IRCbot.gen.a
   •  Panda: W32/Autorun.AML
   •  Eset: Win32/Inject.NBR
   •  Bitdefender: Trojan.Generic.1633736


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification
   • Third party control

 Files It copies itself to the following location:
   • C:\RESTORE\%CLSID%\ROX.exe



The following file is created:

– C:\RESTORE\%CLSID%\Desktop.ini

 Registry The following registry key is added:

– [HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\
   {28ABC5C0-4FCB-11CF-AAX5-21CX1C642122}]
   • "StubPath"="c:\RESTORE\%CLSID%\ROX.exe"

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: rox.ir**********.net
Port: 5900
Server password: Virus
Nickname: VirUs-%random character string%


– Furthermore it has the ability to perform actions such as:
    • Execute file
    • Updates itself

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

설명 삽입자 Petre Galan   2010년 2월 25일 목요일
설명 업데이트 Petre Galan   2010년 2월 26일 금요일

뒤로 . . . .
https:// 이 창은 보안을 위해 암호화되었습니다.