Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLM.Limar.4667

Added to the Dr.Web virus database: 2015-06-19

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates or modifies the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\oJRTYRpyBoc.exe
Malicious functions:
Executes the following:
  • '<SYSTEM32>\svchost.exe' netsvcs
  • '%WINDIR%\explorer.exe'
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
  • %TEMP%\12.tmp
  • %TEMP%\13.tmp
  • %TEMP%\14.tmp
  • %TEMP%\F.tmp
  • %TEMP%\10.tmp
  • %TEMP%\11.tmp
  • %TEMP%\15.tmp
  • %TEMP%\19.tmp
  • %TEMP%\1A.tmp
  • %TEMP%\1B.tmp
  • %TEMP%\16.tmp
  • %TEMP%\17.tmp
  • %TEMP%\18.tmp
  • %TEMP%\E.tmp
  • %TEMP%\~TM4.tmp
  • %TEMP%\~TM5.tmp
  • %TEMP%\6.tmp
  • %TEMP%\1.tmp
  • %TEMP%\2.tmp
  • %TEMP%\3.tmp
  • %TEMP%\7.tmp
  • %TEMP%\B.tmp
  • %TEMP%\C.tmp
  • %TEMP%\D.tmp
  • %TEMP%\8.tmp
  • %TEMP%\9.tmp
  • %TEMP%\A.tmp
Sets the 'hidden' attribute to the following files:
  • %HOMEPATH%\Start Menu\Programs\Startup\oJRTYRpyBoc.exe
Deletes the following files:
  • %TEMP%\12.tmp
  • %TEMP%\14.tmp
  • %TEMP%\13.tmp
  • %TEMP%\6.tmp
  • %TEMP%\10.tmp
  • %TEMP%\11.tmp
  • %TEMP%\15.tmp
  • %TEMP%\19.tmp
  • %TEMP%\1A.tmp
  • %TEMP%\1B.tmp
  • %TEMP%\16.tmp
  • %TEMP%\17.tmp
  • %TEMP%\18.tmp
  • %TEMP%\F.tmp
  • %TEMP%\~TM4.tmp
  • %TEMP%\~TM5.tmp
  • %TEMP%\7.tmp
  • %TEMP%\1.tmp
  • %TEMP%\2.tmp
  • %TEMP%\3.tmp
  • %TEMP%\8.tmp
  • %TEMP%\C.tmp
  • %TEMP%\D.tmp
  • %TEMP%\E.tmp
  • %TEMP%\9.tmp
  • %TEMP%\A.tmp
  • %TEMP%\B.tmp
Deletes itself.
Network activity:
Connects to:
  • 'n7#####fhjwe90fujic.com':80
TCP:
HTTP POST requests:
  • http://n7#####fhjwe90fujic.com/fztckjdqrhy.inc
  • http://n7#####fhjwe90fujic.com/aqhhultfgkzukeyutthqhvdxygavmewaoqhxgxxifmwctcnblyqdrfuln.php3
  • http://n7#####fhjwe90fujic.com/maaaaaaarammgssspupcq.phtm
  • http://n7#####fhjwe90fujic.com/khmtsolmpvbzhcsbvfxuierlhpilhudymmetytdsl.rtf
UDP:
  • DNS ASK n7#####fhjwe90fujic.com
Miscellaneous:
Searches for the following windows:
  • ClassName: 'OleMainThreadWndClass' WindowName: ''
  • ClassName: 'SystemTray_Main' WindowName: ''
  • ClassName: 'CSCHiddenWindow' WindowName: ''
  • ClassName: 'SysListView32' WindowName: ''
  • ClassName: 'Shell_TrayWnd' WindowName: ''
  • ClassName: 'Proxy Desktop' WindowName: ''
  • ClassName: 'BaseBar' WindowName: 'ChanApp'