Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:09/09/2010
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:94.208 Bytes
MD5 checksum:9F184CBD4FAF4B537829E839C8E46DD7
VDF version:
IVDF version: - Thursday, September 9, 2010

 General Method of propagation:

   •  Symantec: Backdoor.Trojan
   •  Mcafee: W32/YahLover.worm
   •  Kaspersky: Trojan.Win32.Jorik.IRCbot.ez
   •  TrendMicro: TSPY_ONLINEG.MHP
     Microsoft: Worm:Win32/Slenfbot.AKD

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows 7

Side effects:
   • Drops files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %WINDIR%\nvsvc32.exe
   • %WINDIR%\nvsvc32.exn

 Registry To each registry key one of the values is added in order to run the processes after reboot:

   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

  [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\
   • "NVIDIA driver monitor"="%WINDIR%\nvsvc32.exe"

 Messenger It is spreading via Messenger. The characteristics are described below:

 Yahoo Messenger

 IRC  Furthermore it has the ability to perform actions such as:
    • Join IRC channel
    • Leave IRC channel

 Miscellaneous  Checks for an internet connection by contacting the following web sites:

 File details Programming language:
The malware program was written in MS Visual C++.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Beschrijving ingevoegd door Andrei Ilie op donderdag 24 maart 2011
Beschrijving bijgewerkt door Andrei Ilie op vrijdag 1 april 2011

Terug . . . .
https:// Dit venster is voor uw veiligheid gecodeerd.