Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Win32.HLLW.Agobot.1523

Added to the Dr.Web virus database: 2012-11-26

Virus description added:

Technical Information

Malicious functions:
Creates and executes the following:
  • %TEMP%\339171.exe
  • %TEMP%\340015.exe
  • %TEMP%\340828.exe
  • %TEMP%\336953.exe
  • %TEMP%\338171.exe
  • %TEMP%\340015.exe (downloaded from the Internet)
  • %TEMP%\340828.exe (downloaded from the Internet)
  • %TEMP%\338171.exe (downloaded from the Internet)
  • %TEMP%\339171.exe (downloaded from the Internet)
  • %TEMP%\336953.exe (downloaded from the Internet)
Executes the following:
  • <SYSTEM32>\cmd.exe /c ""%TEMP%\375031.bat" "<Full path to virus>" "
Searches for registry branches where third party applications store passwords:
  • [<HKCU>\Software\BulletProof Software\BulletProof FTP Client\Options]
  • [<HKCU>\Software\BPFTP]
  • [<HKCU>\Software\BPFTP\Bullet Proof FTP\Options]
  • [<HKCU>\Software\BPFTP\Bullet Proof FTP\Main]
  • [<HKCU>\Software\BulletProof Software\BulletProof FTP Client\Main]
  • [<HKCU>\Software\Sota\FFFTP\Options]
  • [<HKCU>\Software\South River Technologies\WebDrive\Connections]
  • [<HKLM>\Software\South River Technologies\WebDrive\Connections]
  • [<HKCU>\Software\FTP Explorer\Profiles]
  • [<HKCU>\Software\CoffeeCup Software\Internet\Profiles]
  • [<HKCU>\Software\FTPWare\COREFTP\Sites]
  • [<HKLM>\Software\FlashFXP]
  • [<HKCU>\Software\Far2\SavedDialogHistory\FTPHost]
  • [<HKCU>\Software\Ghisler\Windows Commander]
  • [<HKCU>\Software\Far\SavedDialogHistory\FTPHost]
  • [<HKCU>\Software\Far\Plugins\FTP\Hosts]
  • [<HKCU>\Software\Far2\Plugins\FTP\Hosts]
  • [<HKLM>\Software\Ghisler\Windows Commander]
  • [<HKCU>\Software\FlashFXP]
  • [<HKLM>\Software\FlashFXP\3]
  • [<HKCU>\Software\FlashFXP\3]
  • [<HKCU>\Software\Ghisler\Total Commander]
  • [<HKLM>\Software\Ghisler\Total Commander]
Modifies file system :
Creates the following files:
  • %TEMP%\340015.exe
  • %TEMP%\340828.exe
  • %TEMP%\375031.bat
  • %TEMP%\336953.exe
  • %TEMP%\338171.exe
  • %TEMP%\339171.exe
Deletes itself.
Network activity:
Connects to:
  • '20#.#36.67.163':80
  • '91.##0.35.125':80
TCP:
HTTP GET requests:
  • 20#.#36.67.163/8bd7d5194/brgn424t235
  • 20#.#36.67.163/8bd7d5194/werghw45gwe
  • 20#.#36.67.163/8bd7d5194/wert34g45ht
  • 20#.#36.67.163/8bd7d5194/wergwrg3gwer
  • 20#.#36.67.163/8bd7d5194/rebhg542
HTTP POST requests:
  • 91.##0.35.125/internet_goo.php