Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Autoruner1.17528

Added to the Dr.Web virus database: 2012-06-18

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '$.uohnjxkxexg' = '"<SYSTEM32>\$.uohnjxkxexg\uohnjxkxexg.exe"'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winarp' = '"<SYSTEM32>\$.winarp\winarp"'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\RECYCLER\MSVBVM60.DLL
  • <Drive name for removable media>:\RECYCLER\temp.bat
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
  • [<HKLM>\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] 'EnableFirewall' = '00000000'
  • [<HKLM>\SYSTEM\ControlSet002\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile] 'EnableFirewall' = '00000000'
  • [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
Creates and executes the following:
  • <SYSTEM32>\$.winarp\6330383.exe
  • <SYSTEM32>\$.uohnjxkxexg\uohnjxkxexg.exe
  • C:\RECYCLER\temp.exe
  • <SYSTEM32>\$.winarp\winarp.com
Executes the following:
  • <SYSTEM32>\regsvr32.exe MSWINSCN.OCX /s
  • <SYSTEM32>\attrib.exe +H "Z:\autorun.inf"
  • <SYSTEM32>\attrib.exe +H "Z:\RECYCLER"
  • <SYSTEM32>\regsvr32.exe MSWINSCK.OCX /s
  • <SYSTEM32>\ipconfig.exe
  • <SYSTEM32>\cmd.exe /c ""<SYSTEM32>\$.uohnjxkxexg\uohnjxkxexg.bat" "
  • <SYSTEM32>\regsvr32.exe MSVBVM60.DLL /s
  • <SYSTEM32>\regsvr32.exe "<SYSTEM32>\MSVBVM60.DLL" /s
  • <SYSTEM32>\regsvr32.exe "<SYSTEM32>\MSWINSCK.OCX" /s
  • <SYSTEM32>\regsvr32.exe "<SYSTEM32>\MSWINSCN.OCX" /s
  • <SYSTEM32>\attrib.exe +H "E:\RECYCLER"
  • <SYSTEM32>\attrib.exe +H "E:\autorun.inf"
  • <SYSTEM32>\net1.exe stop mpssvc
  • <SYSTEM32>\net.exe stop mpssvc
Terminates or attempts to terminate
the following user processes:
  • nod32.exe
Modifies file system :
Creates the following files:
  • <SYSTEM32>\$.uohnjxkxexg\uohnjxkxexg.bat
  • <SYSTEM32>\$.uohnjxkxexg\uohnjxkxexg.exe
  • <SYSTEM32>\$.uohnjxkxexg\SRSA.exe
  • C:\RECYCLER\KB.DLL
  • <SYSTEM32>\$.uohnjxkxexg\redirect.php
  • <SYSTEM32>\$.uohnjxkxexg\local.temp.dat
  • <SYSTEM32>\$.uohnjxkxexg\gate.temp.dat
  • <SYSTEM32>\$.winarp\6330383.exe
  • <SYSTEM32>\$.winarp\winarp.com
  • C:\RECYCLER\temp.exe
  • C:\RECYCLER\cb.dll
  • <SYSTEM32>\srsa.exe
  • <SYSTEM32>\$.winarp\srsa.exe
  • C:\RECYCLER\$.winarp\winarp.com
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
Deletes the following files:
  • %TEMP%\~DFBC2F.tmp
  • <SYSTEM32>\$.uohnjxkxexg\redirect.php
  • C:\RECYCLER\temp.exe
  • %TEMP%\~DF103A.tmp
Network activity:
Connects to:
  • 'eu######u.agilityhoster.com':80
  • 'eu####eru.110mb.com':80
  • '<Private IP address>':80
  • 'www.fo##yip.com':80
  • 'www.wh###smyip.com':80
  • 'www.wh###myip.org':80
TCP:
HTTP GET requests:
  • eu######u.agilityhoster.comhttp://eui9hteru.agilityhoster.com/redirect2.php
  • eu####eru.110mb.comhttp://eui9hteru.110mb.com/redirect2.php
  • <Private IP address>/InternetGatewayDevice.xml
  • www.fo##yip.comhttp://www.formyip.com/
  • www.wh###smyip.comhttp://www.whatismyip.com/
  • www.wh###myip.orghttp://www.whatsmyip.org/
UDP:
  • DNS ASK eu######u.agilityhoster.com
  • DNS ASK eu####eru.110mb.com
  • DNS ASK www.wh###myip.org
  • DNS ASK www.fo##yip.com
  • DNS ASK www.wh###smyip.com