Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Phorpiex.916

Added to the Dr.Web virus database: 2018-03-18

Virus description added:

Technical Information

To ensure autorun and distribution
Sets the following service settings
  • [<HKLM>\System\CurrentControlSet\Services\VolumeDisk0] 'Start' = '00000002'
  • [<HKLM>\System\CurrentControlSet\Services\VolumeDisk0] 'ImagePath' = '%ALLUSERSPROFILE%\WindowsVolume\sysdisk.exe'
Creates the following services
  • 'VolumeDisk0' %ALLUSERSPROFILE%\WindowsVolume\sysdisk.exe
Malicious functions
Executes the following
  • '%WINDIR%\syswow64\taskkill.exe' /im rfusclient.exe /f
  • '%WINDIR%\syswow64\taskkill.exe' /im rutserv.exe /f
Modifies file system
Creates the following files
  • %TEMP%\$inst\2.tmp
  • %ALLUSERSPROFILE%\windowsvolume\volumedisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\vp8decoder.dll
  • %ALLUSERSPROFILE%\windowsvolume\russian.lg
  • %ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe
  • %ALLUSERSPROFILE%\windowsvolume\diskinstall2.bat
  • %ALLUSERSPROFILE%\windowsvolume\diskinstall.bat
  • %ALLUSERSPROFILE%\windowsvolume\vp8encoder.dll
  • %ALLUSERSPROFILE%\windowsvolume\opendisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\diskupdate.exe
  • %ALLUSERSPROFILE%\windowsvolume\config_set.reg
  • %ALLUSERSPROFILE%\windowsvolume\diskserver.exe
  • %ALLUSERSPROFILE%\windowsvolume\file3.exe
  • %ALLUSERSPROFILE%\windowsvolume\file2.exe
  • %ALLUSERSPROFILE%\windowsvolume\file.exe
  • %TEMP%\$inst\temp_0.tmp
  • %ALLUSERSPROFILE%\windowsvolume\sysdisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\diskpart.dat
Sets the 'hidden' attribute to the following files
  • %ALLUSERSPROFILE%\windowsvolume\diskinstall.bat
  • %ALLUSERSPROFILE%\windowsvolume\diskpart.dat
  • %ALLUSERSPROFILE%\windowsvolume\diskserver.exe
  • %ALLUSERSPROFILE%\windowsvolume\file.exe
  • %ALLUSERSPROFILE%\windowsvolume\file2.exe
  • %ALLUSERSPROFILE%\windowsvolume\file3.exe
  • %ALLUSERSPROFILE%\windowsvolume\opendisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\russian.lg
  • %ALLUSERSPROFILE%\windowsvolume\sysdisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\volumedisk.exe
  • %ALLUSERSPROFILE%\windowsvolume\vp8decoder.dll
  • %ALLUSERSPROFILE%\windowsvolume\vp8encoder.dll
Deletes the following files
  • %TEMP%\$inst\temp_0.tmp
  • %TEMP%\$inst\2.tmp
  • %ALLUSERSPROFILE%\windowsvolume\config_set.reg
  • %ALLUSERSPROFILE%\windowsvolume\diskupdate.exe
  • %ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe
  • %ALLUSERSPROFILE%\windowsvolume\diskinstall2.bat
Network activity
TCP
HTTP GET requests
  • http://rm##sys.ru/utils/inet_id_notify.php?te####
  • 'rm#####ver.tektonit.ru':5655
  • UDP
    • DNS ASK rm##sys.ru
    • DNS ASK rm#####ver.tektonit.ru
    Miscellaneous
    Searches for the following windows
    • ClassName: 'EDIT' WindowName: ''
    • ClassName: 'MS_WINHELP' WindowName: ''
    • ClassName: '' WindowName: ''
    • ClassName: 'RegEdit_RegEdit' WindowName: ''
    Creates and executes the following
    • '%ALLUSERSPROFILE%\windowsvolume\diskserver.exe' -p834784734789789347892898943789787892
    • '%ALLUSERSPROFILE%\windowsvolume\opendisk.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\file.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\file2.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\file3.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe' -p78347834893489894237834783478785788989543536
    • '%ALLUSERSPROFILE%\windowsvolume\diskupdate1.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /silentinstall
    • '%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /firewall
    • '%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe' /start
    • '%ALLUSERSPROFILE%\windowsvolume\sysdisk.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe'
    • '%ALLUSERSPROFILE%\windowsvolume\volumedisk.exe' /tray
    • '%ALLUSERSPROFILE%\windowsvolume\diskupdate.exe' -p78347834893489894237834783478785788989543536' (with hidden window)
    • '%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\WindowsVolume\DiskInstall.bat" "' (with hidden window)
    Executes the following
    • '%WINDIR%\syswow64\cmd.exe' /c ""%ALLUSERSPROFILE%\WindowsVolume\DiskInstall.bat" "
    • '%WINDIR%\syswow64\sc.exe' failure VolumeDisk0 reset= 0 actions= restart/500/restart/500/restart/500
    • '%WINDIR%\syswow64\regedit.exe' /s "%ALLUSERSPROFILE%\WindowsVolume\config_set.reg"
    • '%WINDIR%\syswow64\reg.exe' delete "HKLM\SYSTEM\SystemVolume0\SysHardDisk" /f
    • '%WINDIR%\syswow64\sc.exe' delete AMIHardware
    • '%WINDIR%\syswow64\sc.exe' delete IntelDriver
    • '%WINDIR%\syswow64\sc.exe' delete ServiceWork
    • '%WINDIR%\syswow64\sc.exe' delete NPackStereo
    • '%WINDIR%\syswow64\sc.exe' delete VDeviceCard
    • '%WINDIR%\syswow64\sc.exe' config VolumeDisk0 obj= LocalSystem type= interact type= own
    • '%WINDIR%\syswow64\sc.exe' delete VolumeDisk0
    • '%WINDIR%\syswow64\sc.exe' stop AMIHardware
    • '%WINDIR%\syswow64\sc.exe' stop IntelDriver
    • '%WINDIR%\syswow64\sc.exe' stop ServiceWork
    • '%WINDIR%\syswow64\sc.exe' stop NPackStereo
    • '%WINDIR%\syswow64\sc.exe' stop VDeviceCard
    • '%WINDIR%\syswow64\sc.exe' stop VolumeDisk0
    • '%WINDIR%\syswow64\sc.exe' stop RManService
    • '%WINDIR%\syswow64\attrib.exe' +s +h "%ALLUSERSPROFILE%\WindowsVolume"
    • '%WINDIR%\syswow64\sc.exe' delete RManService
    • '%WINDIR%\syswow64\attrib.exe' +s +h "%ALLUSERSPROFILE%\WindowsVolume\*.*"