Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner.38841

Added to the Dr.Web virus database: 2010-12-22

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Inoyikotadoqev' = 'rundll32.exe "%WINDIR%\mdfwc1.dll",Startup'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Adobe Updater 7.2' = '<SYSTEM32>\AdobeAQM.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<SYSTEM32>\AdobeAQM.exe' = '<SYSTEM32>\AdobeAQM.exe:*:Enabled:Explorer'
Creates and executes the following:
  • <SYSTEM32>\adobemkv.exe 
  • <SYSTEM32>\adobeflv.exe 
Executes the following:
  • <SYSTEM32>\rundll32.exe "%WINDIR%\mdfwc1.dll",iep
  • <SYSTEM32>\rundll32.exe "%WINDIR%\mdfwc1.dll",Startup
Injects code into
the following system processes:
  • <SYSTEM32>\svchost.exe
Hides the following processes:
  • <Full path to virus>
Modifies file system :
Creates the following files:
  • %WINDIR%\mdfwc1.dll
  • <SYSTEM32>\adobemkv.exe
  • <SYSTEM32>\AdobeAQM.exe
  • <SYSTEM32>\adobeflv.exe
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\AdobeAQM.exe
Network activity:
Connects to:
  • '10.##.215.50':139
  • '10.##.204.242':139
  • '10.##.235.170':139
  • '10.##2.102.138':139
  • '10.##2.225.106':139
  • '10.##5.10.90':139
  • '10.##0.41.18':139
  • '10.##5.133.58':139
  • '10.##3.153.186':139
  • '10.##4.143.122':139
  • '10.##8.184.114':139
  • '<Private IP address>':139
  • '10.##0.102.130':445
  • '10.##0.163.242':445
  • '10.##0.41.18':445
  • '10.##9.174.50':445
  • '10.##9.235.162':445
  • '10.##0.225.98':445
  • '10.##.61.154':139
  • '10.##3.92.74':139
  • '10.##8.61.146':139
  • '10.#1.51.90':139
  • '10.##.123.10':139
  • '10.##.174.58':139
  • '10.##.112.202':139
  • '10.##0.225.98':139
  • '10.##0.163.242':139
  • '10.##0.102.130':139
  • '10.#2.41.26':139
  • 'localhost':1184
  • '10.##3.215.42':139
  • '10.##7.194.178':139
  • '10.#6.82.18':139
  • '10.#.30.226':139
  • '10.##5.71.202':139
  • '10.##.71.210':139
  • '10.##4.20.154':139
  • '10.##4.82.10':139
  • '10.##5.194.170':139
  • '10.##8.245.226':139
  • '10.##4.204.234':139
  • '10.##3.30.218':139
  • '10.#5.92.82':139
  • '10.##8.123.2':139
  • '10.##9.51.82':139
  • '10.##.143.130':139
  • '10.##.174.58':445
  • '10.##.235.170':445
  • '10.##.143.130':445
  • '10.##.215.50':445
  • '10.#5.92.82':445
  • '10.#2.41.26':445
  • '10.##2.225.106':445
  • '10.##3.92.74':445
  • '10.##2.163.250':445
  • '10.##2.102.138':445
  • '10.##3.30.218':445
  • '10.##.20.162':445
  • '10.##.61.154':445
  • '10.##.123.10':445
  • '<Private IP address>':445
  • 'www.wh###smyip.com':80
  • 'co##mbee.in':80
  • '10.##.184.122':445
  • '10.##.153.194':445
  • '10.#.30.226':445
  • '10.##.112.202':445
  • '10.##.245.234':445
  • '10.#1.51.90':445
  • '10.##4.82.10':445
  • '10.##4.143.122':445
  • '10.##9.51.82':445
  • '10.##8.184.114':445
  • '10.##8.245.226':445
  • '10.##5.10.90':445
  • '10.##5.194.170':445
  • '10.##9.112.194':445
  • '10.##5.133.58':445
  • '10.##4.204.234':445
  • '10.##5.71.202':445
  • '10.##3.153.186':445
  • '10.#28.0.34':445
  • '10.##7.194.178':445
  • '10.##8.123.2':445
  • '10.##3.215.42':445
  • '10.##8.61.146':445
  • '10.##7.133.66':445
  • '10.##4.20.154':445
  • '10.##.71.210':445
  • '10.#6.82.18':445
  • '10.#7.10.98':445
  • '10.##.204.242':445
TCP:
HTTP GET requests:
  • www.wh###smyip.com/automation/n09230945.asp
HTTP POST requests:
  • co##mbee.in/9823dehj9823dj.php?in##############################################################################################################
UDP:
  • DNS ASK go##le.ca
  • DNS ASK co##mbee.in
  • DNS ASK tu##u.com
  • DNS ASK www.wh###smyip.com
  • '<Private IP address>':1037
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''