Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Trojan.MulDrop13.28075

Added to the Dr.Web virus database: 2020-08-01

Virus description added:

Technical Information

Malicious functions
Executes the following
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=in
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=out
  • '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram c:\ourofarma\VSMDownloader.exe VSMDownloader ENABLE
  • '%WINDIR%\syswow64\netsh.exe' firewall add allowedprogram c:\ourofarma\VSMRepo.exe VSMRepo ENABLE
Modifies file system
Creates the following files
  • <Current directory>\logs\<File name>-2020-07-31.txt
  • <Current directory>\firewall.ini
Deletes the following files
  • <Current directory>\firewall.ini
Miscellaneous
Creates and executes the following
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall show rule name="VSMRepo Service" > <Current directory>\FIREWALL.ini' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSM HTTP Service"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="HTTP Service"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="Servidor de Distribuição de Atualizações"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMRepo Service"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMRepo"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMDownloader"' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=in' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=out' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall set global StatefulFTP disable' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh firewall add allowedprogram c:\ourofarma\VSMDownloader.exe VSMDownloader ENABLE' (with hidden window)
  • '%WINDIR%\syswow64\cmd.exe' /C netsh firewall add allowedprogram c:\ourofarma\VSMRepo.exe VSMRepo ENABLE' (with hidden window)
Executes the following
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall show rule name="VSMRepo Service" > <Current directory>\FIREWALL.ini
  • '%WINDIR%\syswow64\netsh.exe' advfirewall set global StatefulFTP disable
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall set global StatefulFTP disable
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=out
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall add rule name="VSMRepo Service" action=allow protocol=TCP dir=in
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="VSMDownloader"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMDownloader"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="VSMRepo"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMRepo"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="VSMRepo Service"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSMRepo Service"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="Servidor de Distribuição de Atualizações"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="Servidor de Distribuição de Atualizações"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="HTTP Service"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="HTTP Service"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall delete rule name="VSM HTTP Service"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh advfirewall firewall delete rule name="VSM HTTP Service"
  • '%WINDIR%\syswow64\netsh.exe' advfirewall firewall show rule name="VSMRepo Service"
  • '%WINDIR%\syswow64\cmd.exe' /C netsh firewall add allowedprogram c:\ourofarma\VSMDownloader.exe VSMDownloader ENABLE
  • '%WINDIR%\syswow64\cmd.exe' /C netsh firewall add allowedprogram c:\ourofarma\VSMRepo.exe VSMRepo ENABLE

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android