Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:TR/Spy.208384.16
Date discovered:14/12/2009
Type:Trojan
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:208.384 Bytes
MD5 checksum:4C343C9FCECE2E6739A5834579448A46
VDF version:7.10.00.146
IVDF version:7.10.01.239 - Monday, December 14, 2009

 General Aliases:
   •  Kaspersky: Worm.Win32.Ngrbot.hy
   •  TrendMicro: WORM_KOLAB.SMQX
   •  Microsoft: Worm:Win32/Dorkbot.A


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows 7


Side effects:
   • Drops files
   • Registry modification

 Files It copies itself to the following location:
   • %APPDATA%\%random character string%.exe



It deletes the initially executed copy of itself.

 Registry One of the following values is added in order to run the process after reboot:

–  [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "%random character string%"="%APPDATA%\%random character string%.exe"



The following registry key is changed:

Various Explorer settings:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced]
   New value:
   • "ShowSuperHidden"=dword:00000000

 IRC To deliver system information and to provide remote control it connects to the following IRC Servers:

Server: **********ea.dukatlgg.com
Port: 3211
Nickname: %random character string%

Server: **********o.dukatlgg.com
Port: 3212
Nickname: %random character string%



– This malware has the ability to collect and send information such as:
    • Username
    • Information about the Windows operating system


– Furthermore it has the ability to perform actions such as:
    • connect to IRC server
    • disconnect from IRC server
    • Join IRC channel
    • Leave IRC channel

 Miscellaneous Accesses internet resources:
   • api.wipmania.com

Description inserted by Andrei Ilie on Tuesday, October 4, 2011
Description updated by Andrei Ilie on Wednesday, October 5, 2011

Back . . . .