Win32.HLLW.Autoruner.21158
Added to the Dr.Web virus database:
2010-05-19
Virus description added:
2014-07-18
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Firewall Administrating' = '%WINDIR%\infocard.exe'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '%WINDIR%\infocard.exe:*:Enabled:Firewall Administrating'
- [<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List] '<Full path to virus>' = '<Full path to virus>:*:Enabled:Firewall Administrating'
Creates and executes the following:
Executes the following:
- '<SYSTEM32>\net.exe' stop wuauserv
- '<SYSTEM32>\sc.exe' config wuauserv start= disabled
- '<SYSTEM32>\net1.exe' stop wuauserv
- '%WINDIR%\explorer.exe' http://br#####sers.myspace.com/Browse/Browse.aspx
- '<SYSTEM32>\net.exe' stop MsMpSvc
- '<SYSTEM32>\net1.exe' stop MsMpSvc
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram 1.exe 1 ENABLE
Searches for windows to
detect programs and games:
- ClassName: 'MSNHiddenWindowClass' WindowName: '(null)'
- ClassName: '_Oscar_StatusNotify' WindowName: '(null)'
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\Browse[1].aspx
- %WINDIR%\infocard.exe
- %WINDIR%\infocard.exg
Sets the 'hidden' attribute to the following files:
- %WINDIR%\infocard.exe
- <Full path to virus>
Deletes the following files:
Network activity:
Connects to:
- 'br#####sers.myspace.com':80
- 'vo##.#bxcalls.net':1234
- 'localhost':1038
TCP:
HTTP GET requests:
- br#####sers.myspace.com/Browse/Browse.aspx
UDP:
- DNS ASK br#####sers.myspace.com
- DNS ASK vo##.#bxcalls.net
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'
- ClassName: 'Message Session' WindowName: '(null)'
- ClassName: 'MS_WebcheckMonitor' WindowName: '(null)'
- ClassName: 'MS_AutodialMonitor' WindowName: '(null)'
- ClassName: '' WindowName: '(null)'
- ClassName: 'Indicator' WindowName: '(null)'
- ClassName: 'TskMultiChatForm.UnicodeClass' WindowName: '(null)'
- ClassName: '__oxFrame.class__' WindowName: '(null)'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息