Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner2.40973

Added to the Dr.Web virus database: 2018-07-03

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following files on removable media:
  • <Drive name for removable media>:\x.exe
  • <Drive name for removable media>:\.lnk
Modifies file system:
Creates the following files:
  • %TEMP%\aut1.tmp
  • %TEMP%\SKNAHD.3gp
  • %APPDATA%\Windata\crss.exe
  • %TEMP%\Data.txt
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\x.exe
Deletes the following files:
  • %TEMP%\aut1.tmp
  • %TEMP%\Data.txt
Substitutes the following files:
  • %TEMP%\Data.txt
Network activity:
Connects to:
  • 'ip###ore.com':80
  • '51.##4.14.121':1337
TCP:
HTTP GET requests:
  • http://ip###ore.com/checkip/
UDP:
  • DNS ASK ip###ore.com
Miscellaneous:
Executes the following:
  • '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shell32.dll,OpenAs_RunDLL %TEMP%\SKNAHD.3gp