Win32.HLLW.Autoruner2.16462
Added to the Dr.Web virus database:
2014-07-27
Virus description added:
2014-07-27
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'recyclerr' = '%APPDATA%\recyclerr\recyclerr.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,%APPDATA%\recyclerr\recyclerr.exe,'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] 'wextract_cleanup0' = 'rundll32.exe <SYSTEM32>\advpack.dll,DelNodeRunDLL32 "%TEMP%\IXP000.TMP\"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'recyclerr' = '%APPDATA%\recyclerr\recyclerr.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\ntldr.exe
Malicious functions:
Creates and executes the following:
- '%TEMP%\5468805.exe'
- '%TEMP%\5668805.exe'
- '%TEMP%\IXP000.TMP\bukahke.exe'
- '%TEMP%\5468805.exe' (downloaded from the Internet)
- '%TEMP%\5668805.exe' (downloaded from the Internet)
Executes the following:
- '<SYSTEM32>\wscript.exe' "<SYSTEM32>\net.vbs"
- '<SYSTEM32>\cmd.exe' /c ""<SYSTEM32>\launchz.bat" "
- '<SYSTEM32>\wscript.exe' "<SYSTEM32>\launchz.vbs"
Modifies file system :
Creates the following files:
- <SYSTEM32>\net.vbs
- C:\autorun.inf
- %WINDIR%\tmpp.log
- <SYSTEM32>\launch.bat
- <SYSTEM32>\logg.txt
- <SYSTEM32>\launch.vbs
- <SYSTEM32>\launchz.vbs
- %TEMP%\5468805.exe
- %TEMP%\5668805.exe
- %TEMP%\IXP000.TMP\bukahke.exe
- <SYSTEM32>\launchz.bat
- %APPDATA%\recyclerr\recyclerr.exe
- <DRIVERS>\tmpp.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\ntldr.exe
- C:\autorun.inf
- C:\ntldr.exe
Deletes the following files:
- <SYSTEM32>\launchz.bat
- <SYSTEM32>\launchz.vbs
Network activity:
Connects to:
- 'co####ice.zapto.org':80
- 'www.mo####hacker2.info':80
- 'wp#d':80
TCP:
HTTP GET requests:
- co####ice.zapto.org/Updatefixed.exe
- www.mo####hacker2.info/PB_2.5/extractor.exe
- wp#d/wpad.dat
UDP:
- DNS ASK co####ice.zapto.org
- DNS ASK www.mo####hacker2.info
- DNS ASK wp#d
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'
欢迎下载
Dr.Web for Android
-
免费3个月
-
可使用所有保护组件
-
可在AppGallery/Google Pay延期
继续使用此网站意味着您同意我们使用Cookie文件和其他用于收集网站访问统计信息的技术手段。详细信息