Win32.HLLW.Autoruner1.35590
Added to the Dr.Web virus database:
2013-04-25
Virus description added:
2013-05-01
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '39396519fcb83bfbe916d216db0cb897' = '"%TEMP%\rar.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Facebook Update' = '"<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe" /c /nocrashserver'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '39396519fcb83bfbe916d216db0cb897' = '"%TEMP%\rar.exe" ..'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '9fa6e11d4387f53602ce074613fe80b9' = '"%TEMP%\traCker.exe" ..'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '9fa6e11d4387f53602ce074613fe80b9' = '"%TEMP%\traCker.exe" ..'
Creates or modifies the following files:
- %WINDIR%\Tasks\FacebookUpdateTaskUserS-1-5-21-2052111302-484763869-725345543-1003Core.job
- %WINDIR%\Tasks\FacebookUpdateTaskUserS-1-5-21-2052111302-484763869-725345543-1003UA.job
- %HOMEPATH%\Start Menu\Programs\Startup\9fa6e11d4387f53602ce074613fe80b9.exe
- %HOMEPATH%\Start Menu\Programs\Startup\39396519fcb83bfbe916d216db0cb897.exe
Creates the following files on removable media:
- <Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe.lnk
- <Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe.lnk
- <Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe
- <Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\traCker.exe' = '%TEMP%\traCker.exe:*:Enabled:traCker.exe'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '%TEMP%\rar.exe' = '%TEMP%\rar.exe:*:Enabled:rar.exe'
Creates and executes the following:
- '<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /ig "appguid={4703ba42-f411-4b24-b495-0e537dd9b3fd}&appname=Facebook%20Video%20Call%20Plug-In&needsadmin=False&lang=en&elevateonly=True"
- '%TEMP%\GUM1.tmp\FacebookUpdate.exe' /install "appguid={4703ba42-f411-4b24-b495-0e537dd9b3fd}&appname=Facebook%20Video%20Call%20Plug-In&needsadmin=False&lang=en&elevateonly=True"
- '<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /c /nocrashserver
- '<LS_APPDATA>\Facebook\Update\FacebookUpdate.exe' /RegServer
- '%PROGRAM_FILES%\Company\NewProduct\FacebookVideoCallSetup_v1.2.205.0.exe'
- '%TEMP%\traCker.exe'
- '%APPDATA%\2.exe'
- '%TEMP%\rar.exe'
- '%APPDATA%\17 avril.exe'
Executes the following:
- '%PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE' http://www.fa###ook.com/omaha/help.php?hl##################################################################################################################################################################################################################
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\rar.exe" "rar.exe" ENABLE
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\traCker.exe" "traCker.exe" ENABLE
Modifies file system :
Creates the following files:
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\39396519fcb83bfbe916d216db0cb897.exe
- <Drive name for removable media>:\9fa6e11d4387f53602ce074613fe80b9.exe
Deletes the following files:
- %TEMP%\GUM1.tmp\goopdateres_pl.dll
- %TEMP%\GUM1.tmp\goopdateres_or.dll
- %TEMP%\GUM1.tmp\goopdateres_no.dll
- %TEMP%\GUM1.tmp\goopdateres_pt-BR.dll
- %TEMP%\GUM1.tmp\goopdateres_ru.dll
- %TEMP%\GUM1.tmp\goopdateres_ro.dll
- %TEMP%\GUM1.tmp\goopdateres_pt-PT.dll
- %TEMP%\GUM1.tmp\goopdateres_nl.dll
- %TEMP%\GUM1.tmp\goopdateres_lt.dll
- %TEMP%\GUM1.tmp\goopdateres_ko.dll
- %TEMP%\GUM1.tmp\goopdateres_kn.dll
- %TEMP%\GUM1.tmp\goopdateres_lv.dll
- %TEMP%\GUM1.tmp\goopdateres_ms.dll
- %TEMP%\GUM1.tmp\goopdateres_mr.dll
- %TEMP%\GUM1.tmp\goopdateres_ml.dll
- %TEMP%\GUM1.tmp\goopdateres_vi.dll
- %TEMP%\GUM1.tmp\goopdateres_ur.dll
- %TEMP%\GUM1.tmp\goopdateres_uk.dll
- %TEMP%\GUM1.tmp\goopdateres_zh-CN.dll
- %TEMP%\$inst\2.tmp
- %TEMP%\GUT2.tmp
- %TEMP%\GUM1.tmp\goopdateres_zh-TW.dll
- %TEMP%\GUM1.tmp\goopdateres_tr.dll
- %TEMP%\GUM1.tmp\goopdateres_sr.dll
- %TEMP%\GUM1.tmp\goopdateres_sl.dll
- %TEMP%\GUM1.tmp\goopdateres_sk.dll
- %TEMP%\GUM1.tmp\goopdateres_sv.dll
- %TEMP%\GUM1.tmp\goopdateres_th.dll
- %TEMP%\GUM1.tmp\goopdateres_te.dll
- %TEMP%\GUM1.tmp\goopdateres_ta.dll
- %TEMP%\GUM1.tmp\goopdateres_ja.dll
- %TEMP%\GUM1.tmp\goopdateres_da.dll
- %TEMP%\GUM1.tmp\goopdateres_cs.dll
- %TEMP%\GUM1.tmp\goopdateres_ca.dll
- %TEMP%\GUM1.tmp\goopdateres_de.dll
- %TEMP%\GUM1.tmp\goopdateres_en-GB.dll
- %TEMP%\GUM1.tmp\goopdateres_en.dll
- %TEMP%\GUM1.tmp\goopdateres_el.dll
- %TEMP%\GUM1.tmp\goopdateres_bn.dll
- %TEMP%\GUM1.tmp\FacebookCrashHandler.exe
- %TEMP%\GUM1.tmp\FacebookUpdate.exe
- %TEMP%\$inst\temp_0.tmp
- %TEMP%\GUM1.tmp\goopdate.dll
- %TEMP%\GUM1.tmp\goopdateres_bg.dll
- %TEMP%\GUM1.tmp\goopdateres_ar.dll
- %TEMP%\GUM1.tmp\FacebookUpdateHelper.msi
- %TEMP%\GUM1.tmp\goopdateres_hu.dll
- %TEMP%\GUM1.tmp\goopdateres_hr.dll
- %TEMP%\GUM1.tmp\goopdateres_hi.dll
- %TEMP%\GUM1.tmp\goopdateres_id.dll
- %TEMP%\GUM1.tmp\goopdateres_iw.dll
- %TEMP%\GUM1.tmp\goopdateres_it.dll
- %TEMP%\GUM1.tmp\goopdateres_is.dll
- %TEMP%\GUM1.tmp\goopdateres_gu.dll
- %TEMP%\GUM1.tmp\goopdateres_et.dll
- %TEMP%\GUM1.tmp\goopdateres_es-419.dll
- %TEMP%\GUM1.tmp\goopdateres_es.dll
- %TEMP%\GUM1.tmp\goopdateres_fa.dll
- %TEMP%\GUM1.tmp\goopdateres_fr.dll
- %TEMP%\GUM1.tmp\goopdateres_fil.dll
- %TEMP%\GUM1.tmp\goopdateres_fi.dll
Network activity:
Connects to:
- 'www.fa###ook.com':80
- 'www.fa###ook.com':443
- 'localhost':1075
- 'cr#####ackers.zapto.org':1177
- 'po####9.no-ip.biz':1177
- 'wp#d':80
TCP:
HTTP GET requests:
- www.fa###ook.com/omaha/help.php?hl##################################################################################################################################################################################################################
- wp#d/wpad.dat
HTTP POST requests:
- www.fa###ook.com/omaha/update.php
UDP:
- DNS ASK wp#d
- DNS ASK www.fa###ook.com
- DNS ASK cr#####ackers.zapto.org
- DNS ASK po####9.no-ip.biz
Miscellaneous:
Searches for the following windows:
- ClassName: 'MS_AutodialMonitor' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: '' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息