Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Win32.HLLW.Facebook.1642

Added to the Dr.Web virus database: 2012-09-05

Virus description added:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\hasplic] 'Start' = '00000001'
  • [<HKLM>\SYSTEM\ControlSet001\Services\flexsrv] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
  • <Full path to virus>.exe --uninstall
Executes the following:
  • <SYSTEM32>\sc.exe start "flexsrv"
  • <SYSTEM32>\reg.exe adD "hklm\SOfTwaRe\mIcrOSoFt\WiNdoWs nt\CURrENtveRSiOn\svcHoSt" /v netwisvc /t rEg_mULti_sz /d "flexsrv\0" /f
  • <SYSTEM32>\reg.exe adD "hkLm\sYsTEm\CuRrenTcoNtRoLSeT\seRvIcES\flexsrv" /v FailureActions /t rEG_BInaRY /d 00000000000000000000000003000000140000000100000060EA00000100000060EA00000100000060EA0000 /f
  • <SYSTEM32>\ipconfig.exe /flushdns
  • <SYSTEM32>\sc.exe boot ok
  • <SYSTEM32>\svchost.exe -k netwisvc
  • <SYSTEM32>\reg.exe adD "hkLm\sYsTEm\CuRrenTcoNtRoLSeT\seRvIcES\flexsrv\Parameters" /v ServiceDll /t ReG_EXpaND_Sz /d "<SYSTEM32>\dimax.dll" /f
  • <SYSTEM32>\reg.exe aDd "hklm\SOFTWARE\Microsoft\Internet Explorer\Main" /v TP /t ReG_Sz /d "1" /f
  • <SYSTEM32>\cmd.exe /c "%TEMP%\setup_winver.bat"
  • <SYSTEM32>\cmd.exe /c ""<Full path to virus>.exe" --uninstall > "%TEMP%\setup_winver.bat""
  • <SYSTEM32>\sc.exe CreATe "flexsrv" tyPE= share start= auto binPaTh= "<SYSTEM32>\svchost.exe -k netwisvc" DisplayName= "Windows Service TCP/IP Ordering"
  • <SYSTEM32>\netsh.exe fIrEwaLl aDD pOrToPEnIng tcP 8085 "HASPNT" eNABLe
  • <SYSTEM32>\netsh.exe FIReWAlL Add allOweDPrOgrAm naMe="FLEXlm License Service" prOGram="<SYSTEM32>\svchost.exe" mode=ENABLE
Modifies file system :
Creates the following files:
  • %TEMP%\hlemunt.sys
  • %TEMP%\setup_winver.bat
  • <Full path to virus>.exe
  • %TEMP%\dimax.dll
Deletes the following files:
  • <Full path to virus>.exe
Deletes itself.
Network activity:
Connects to:
  • 'se####.#3sachenbacher02.com':80
  • 'localhost':8085
TCP:
HTTP GET requests:
  • se####.#3sachenbacher02.com/Search.php?v=##################################################
UDP:
  • DNS ASK se####.#3sachenbacher02.com