Precisa de ajuda? Peça à comunidade ou contrate um perito.
Acesse a Avira Answers
Date discovered:20/05/2013
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:87040 Bytes
MD5 checksum:D8362A96F0F2920A82D8F41EC342A679
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Downloader.Liftoh
   •  Mcafee: Atermis!D8362A96F0F2
   •  Kaspersky: BAckdoor.Win32.CPD.phs
   •  TrendMicro: WORM_KBFACe.QMU
   •  F-Secure: Gen:Variant.Symmi.21280
   •  Sophos: Troj/DwnLdr-KUW
   •  Bitdefender: Trojan.GenericKDV.1003140
   •  Avast: Win32,Agent-AREQ[Trj]
   •  Microsoft: Win32/Alureon.GC
   •  AVG: Downloader.Generic13.AUTC
   •  Eset: Win32/Gapz.E
   •  GData: Trojan.GenericKDV.1003140
   •  DrWeb: Trojan.Gapz.17
   •  Ikarus: Backdoor.Win32.CPD

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %AllUsersProfile%\Application Data\%random%.exe

 Registry The following registry key is continuously in an infinite loop added in order to run the process after reboot.

–  HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
   • "%random%"="%allusersprofiles%\application data\%random%.exe"

The following registry key is added:

– HKCU\SOFTWARE\%random%
   • "CurrentPath111"="%allusersprofiles%\application data\%random%.exe"

 Backdoor Contact server:
One of the following:
   • r.gig**********
   • x.da**********

This is done via the HTTP POST method using a PHP script.

Descrição enviada por Soe-liang Tan em quarta-feira, 22 de maio de 2013
Descrição atualizada por Soe-liang Tan em quarta-feira, 22 de maio de 2013

Voltar . . . .