Нужен совет? Обратитесь за помощью к сообществу или специалистам.
Перейти к Avira Answers
Virus:Worm/Autorun.zvk
Date discovered:11/02/2009
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:24.660 Bytes
MD5 checksum:3e960c1979b6c0678aca22caa6043449
IVDF version:7.01.02.09 - Wednesday, February 11, 2009

 General Method of propagation:
   • Autorun feature


Aliases:
   •  Mcafee: W32/Autorun.worm.bx
   •  Panda: W32/Autorun.IST.worm
   •  Eset: Win32/AutoRun.Agent.JA
   •  Bitdefender: Trojan.Agent.AMQP


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Blocks access to certain websites
   • Blocks access to security websites
   • Downloads malicious files
   • Drops malicious files

 Files  It copies itself to the following locations. Those files have random bytes appended so they may differ from the original one:
   • %WINDIR%\ini\ini.exe
   • %drive%\recycle.{%CLSID%}\ini.exe



It overwrites a file.
%SYSDIR%\drivers\etc\hosts



It deletes the initially executed copy of itself.



The following files are created:

%WINDIR%\ini\desktop.ini
%drive%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

%PROGRAM FILES%\Common Files\Microsoft Shared\web server extensions\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc

%PROGRAM FILES%\Common Files\Microsoft Shared\Web Folders\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc

%WINDIR%\Tasks\°²×°.bat Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.zvk

%WINDIR%\ini\shit.vbs Further investigation pointed out that this file is malware, too. Detected as: TR/Script.11167

%WINDIR%\ini\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc

%all directories%\wsock32.dll Further investigation pointed out that this file is malware, too. Detected as: Worm/Autorun.nvc




It tries to download some files:

– The location is the following:
   • http://w.wonthe.cn/**********
At the time of writing this file was not online for further investigation.

– The location is the following:
   • http://w.ssddffgg.cn/d5/**********?mac=YHhYzoFSpF&ver=1.3

 Hosts The host file is modified as explained:

– In this case existing entries are deleted.

– Access to the following domains is effectively blocked:
   • 127.0.0.1 www.360.cn; 127.0.0.1 www.360safe.cn; 127.0.0.1
      www.360safe.com; 127.0.0.1 www.chinakv.com; 127.0.0.1
      www.rising.com.cn; 127.0.0.1 rising.com.cn; 127.0.0.1 dl.jiangmin.com;
      127.0.0.1 jiangmin.com; 127.0.0.1 www.jiangmin.com; 203.208.37.99
      www.duba.net; 127.0.0.1 www.eset.com.cn; 127.0.0.1 www.nod32.com;
      203.208.37.99 shadu.duba.net; 203.208.37.99 union.kingsoft.com;
      127.0.0.1 www.kaspersky.com.cn; 127.0.0.1 kaspersky.com.cn; 127.0.0.1
      virustotal.com; 127.0.0.1 www.kaspersky.com; 127.0.0.1 60.210.176.251;
      127.0.0.1 www.cnnod32.cn; 127.0.0.1 www.lanniao.org; 127.0.0.1
      www.nod32club.com; 127.0.0.1 www.dswlab.com; 127.0.0.1 bbs.sucop.com;
      127.0.0.1 www.virustotal.com; 127.0.0.1 tool.ikaka.com; 127.0.0.0
      360.qihoo.com; 127.0.0.1 qihoo.com; 127.0.0.1 www.qihoo.com; 127.0.0.1
      www.qihoo.cn; 127.0.0.1 124.40.51.17; 127.0.0.1 58.17.236.92


 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Описание добавил Petre Galan в(о) пятница, 26 февраля 2010 г.
Описание обновил Petre Galan в(о) понедельник, 1 марта 2010 г.

Назад . . . .
https:// Это окно зашифровано для вашей безопасности.