Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:09/12/2008
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:184.880 Bytes
MD5 checksum:2eb859bd6f3c2805daafe13dded883dc
IVDF version: - Tuesday, December 9, 2008

 General Method of propagation:
    Autorun feature

   •  Bitdefender: Trojan.Generic.1619889
   •  Panda: W32/Autorun.IUB

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
   • Downloads malicious files
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following location:
   • %drive%\m.exe

It deletes the initially executed copy of itself.

It deletes the following file:
   • %SYSDIR%\RCX%hex number%.tmp

The following files are created:

%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%TEMPDIR%\%hex values%.bat Furthermore it gets executed after it was fully created.
%SYSDIR%\%hex values%.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.Raz.21

%SYSDIR%\RCX%hex number%.tmp Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.Raz.14

 Registry The following registry keys are added:

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Blud"="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"

[HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
   %hex values%]
   • "Asynchronous"=dword:0x00000001
   • "DllName"="%SYSDIR%\%hex values%.dll"
   • "Impersonate"=dword:0x00000000
   • "Lock"="lck"
   • "Logoff"="lf"
   • "Logon"="l"
   • "Shutdown"="sd"
   • "StartScreenSaver"="sss"
   • "StartShell"="ss"
   • "Startup"="sup"
   • "StopScreenSaver"="stsss"
   • "Unlock"="u"

 Backdoor Contact server:
All of the following:

This is done via the HTTP GET request on a PHP script.

 Injection – It injects a backdoor routine into a process.

    Process name:
   • winlogon.exe

 File details Programming language:
The malware program was written in MS Visual C++.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Beschrijving ingevoegd door Petre Galan op donderdag 11 november 2010
Beschrijving bijgewerkt door Petre Galan op vrijdag 12 november 2010

Terug . . . .
https:// Dit venster is voor uw veiligheid gecodeerd.