Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/07/2011
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:184.320 Bytes
MD5 checksum:9D3FD5ECD989B6D056E1D94AD617217F
VDF version: - Wednesday, July 13, 2011
IVDF version: - Wednesday, July 13, 2011

 General Aliases:
   •  TrendMicro: WORM_RIMECUD.PV
   •  Sophos: Troj/VB-FLG
     Microsoft: VirTool:Win32/Vbinder.CK

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows 7

Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %recycle bin%\S-1-5-21-3101407138-0028416147-049938649-3825\test.exe

 Registry One of the following values is added in order to run the process after reboot:

  [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Taskman"="%recycle bin%\S-1-5-21-3101407138-0028416147-049938649-3825\test.exe"

 Injection  It injects itself as a remote thread into processes.

    All of the following processes:
   • %WINDIR%\explorer.exe
   • %SYSDIR%\ctfmon.exe

 File details Programming language:
The malware program was written in Visual Basic.

Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Açıklamayı yerleştiren Andrei Ilie tarihinde 24 Ekim 2011 Pazartesi
Açıklamayı güncelleyen: Andrei Ilie tarihinde 25 Ekim 2011 Salı

Geri . . . .
https:// Bu pencere güvenlik amacıyla şifrelenmiştir.