Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner2.40698

Added to the Dr.Web virus database: 2018-06-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\myDisk\drivers.exe
  • <Drive name for removable media>:\autorun.inf
Modifies file system:
Creates the following files:
  • %TEMP%\aut1.tmp
  • %TEMP%\khgnnuu
  • %TEMP%\aut2.tmp
  • %TEMP%\delphi.au3.509
  • %TEMP%\aut3.tmp
  • %TEMP%\delph1.bin
  • %TEMP%\aut4.tmp
  • %TEMP%\pd4ta.bin
  • %TEMP%\pd4ta.dat
  • %TEMP%\delph1.dat
  • %TEMP%\aut5.tmp
  • %TEMP%\yctuofn
  • %TEMP%\07E721AE1943BE7380C25530D4BE8A21
  • %TEMP%\svchost.exe
Sets the 'hidden' attribute to the following files:
  • <Full path to file>
  • %TEMP%\pd4ta.dat
  • <Drive name for removable media>:\myDisk\drivers.exe
  • <Drive name for removable media>:\autorun.inf
Deletes the following files:
  • %TEMP%\aut1.tmp
  • %TEMP%\khgnnuu
  • %TEMP%\aut2.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\aut4.tmp
  • %TEMP%\aut5.tmp
  • %TEMP%\yctuofn
Network activity:
Connects to:
  • '74.##5.232.51':80
TCP:
HTTP GET requests:
  • http://google.com/ via 74.##5.232.51
UDP:
  • DNS ASK google.com
Miscellaneous:
Creates and executes the following:
  • '<Full path to file>' /AutoIt3ExecuteScript "%TEMP%\delph1.dat"
Executes the following:
  • '<SYSTEM32>\cmd.exe' /C echo. > "%TEMP%\svchost.exe":Zone.Identifier