Нужен совет? Обратитесь за помощью к сообществу или специалистам.
Перейти к Avira Answers
Virus:Worm/Sohanad.AS
Date discovered:20/02/2008
Type:Worm
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:No
File size:~320.000 Bytes
IVDF version:7.00.02.163 - Wednesday, February 20, 2008

 General Method of propagation:
   • Messenger


Aliases:
   •  Kaspersky: IM-Worm.Win32.Sohanad.as
   •  F-Secure: IM-Worm.Win32.Sohanad.as
   •  Sophos: W32/SillyFDC-AE
   •  Eset: Win32/Hakaglan.G worm
   •  Bitdefender: Win32.Worm.Sohanad.NBL


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a file
   • Downloads files
   • Lowers security settings
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\SCVVHSOT.exe
   • %WINDIR%\SCVVHSOT.exe
   • %SYSDIR%\blastclnnn.exe



The following files are created:

– Non malicious file:
   • %SYSDIR%\setting.ini

%SYSDIR%\autrun.ini This is a non malicious text file with the following content:
   • [Autorun]
     Open=SCVVHSOT.exe
     Shellexe cute=SCVVHSOT.exe
     Shell\Open\command=SCVVHSOT.exe
     Shell=Open




It tries to download a file:

– The locations are the following:
   • http://www.freewebs.com/setting3/**********
   • http://setting3.9999mb.com/**********
At the time of writing this file was not online for further investigation.

 Registry The following registry key is added in order to run the process after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • Yahoo Messengger="%SYSDIR%\SCVVHSOT.exe"



The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\Schedule]
   • AtTaskMaxHours=dword:00000000



The following registry keys are changed:

Disable Regedit and Task Manager:
– HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
   Old value:
   • DisableTaskMgr=%user defined settings%
   • DisableRegistryTools=%user defined settings%
   New value:
   • DisableTaskMgr=dword:00000001
   • DisableRegistryTools=dword:00000001

Various Explorer settings:
– HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
   Old value:
   • NofolderOptions=%user defined settings%
   New value:
   • NofolderOptions=dword:00000001

 Messenger It is spreading via Messenger. The characteristics are described below:

– Yahoo Messenger


To:
All entries in the contact list.

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Описание добавил Alexander Neth в(о) пятница, 20 июня 2008 г.
Описание обновил Andrei Gherman в(о) понедельник, 23 июня 2008 г.

Назад . . . .
https:// Это окно зашифровано для вашей безопасности.