Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Phorpiex.320

Added to the Dr.Web virus database: 2018-02-16

Virus description added:

Technical Information

Malicious functions:
Executes the following:
  • '<SYSTEM32>\taskkill.exe' /f /im rfusclient.exe
  • '<SYSTEM32>\taskkill.exe' /f /im rutserv.exe
Modifies file system:
Creates the following files:
  • <SYSTEM32>\vipcatalog\rutserv.exe
  • <SYSTEM32>\vipcatalog\rfusclient.exe
  • <SYSTEM32>\vipcatalog\vp8encoder.dll
  • <SYSTEM32>\vipcatalog\regedit.reg
  • <SYSTEM32>\vipcatalog\russian.lg
  • <SYSTEM32>\vipcatalog\WmiPrvSE.exe
  • %WINDIR%\Acronis\install.exe
  • %WINDIR%\Acronis\install.sfx.exe
  • %WINDIR%\Acronis\1.bat
  • <SYSTEM32>\vipcatalog\vp8decoder.dll
  • <SYSTEM32>\vipcatalog\install.bat
  • <SYSTEM32>\vipcatalog\start.vbs
Miscellaneous:
Searches for the following windows:
  • ClassName: '' WindowName: ''
  • ClassName: '' WindowName: 'Remote Manipulator System - ??????'
  • ClassName: 'EDIT' WindowName: ''
Creates and executes the following:
  • '<SYSTEM32>\wscript.exe' "<SYSTEM32>\vipcatalog\start.vbs"
  • '<SYSTEM32>\vipcatalog\WmiPrvSE.exe'
  • '%WINDIR%\Acronis\install.sfx.exe' -p123 -d%WINDIR%\Acronis
  • '%WINDIR%\Acronis\install.exe'
Executes the following:
  • '<SYSTEM32>\cmd.exe' /c ""<SYSTEM32>\vipcatalog\install.bat" "
  • '<SYSTEM32>\cmd.exe' /c ""%WINDIR%\Acronis\1.bat" "