Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Autoruner.8390

Added to the Dr.Web virus database: 2012-12-28

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{019174B5-5DB4-AD46-5A77-51E8D88B0970}] 'StubPath' = '<SYSTEM32>:winsock.exe'
Malicious functions:
Injects code into
the following system processes:
  • %WINDIR%\Explorer.EXE
Searches for windows to
detect analytical utilities:
  • ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
  • ClassName: 'RegmonClass' WindowName: ''
  • ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
  • ClassName: 'FilemonClass' WindowName: ''
  • ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
  • ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
Modifies file system :
Creates the following files:
  • <SYSTEM32>:winsock.exe
Deletes itself.
Network activity:
Connects to:
  • 'gz#.#ooo.com':5020
  • '<Private IP address>':5020
  • 'localhost':5020
  • 'gr####ndk.mooo.com':5020
UDP:
  • DNS ASK gz#.#ooo.com
  • DNS ASK gr####ndk.mooo.com
Miscellaneous:
Searches for the following windows:
  • ClassName: '18467-41' WindowName: ''