Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'TCP/IP UPnP Access Presentation Now Card' = '<SYSTEM32>\ueetohuzfxat.exe'
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Logs Now Transaction Volume Alerts Config] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
- Windows Security Center
Creates and executes the following:
- '<SYSTEM32>\ctgoikahqoa.exe' "<SYSTEM32>\ueetohuzfxat.exe"
- '%WINDIR%\Temp\eyjkmwn47x6ubxk.exe' -r 49071 tcp
- '%TEMP%\eyjkmwn43ytubxyihuws1.exe'
- '<SYSTEM32>\ueetohuzfxat.exe'
Modifies file system :
Creates the following files:
- <SYSTEM32>\agrccje\run
- <SYSTEM32>\agrccje\rng
- %WINDIR%\Temp\eyjkmwn47x6ubxk.exe
- <SYSTEM32>\agrccje\cfg
- <SYSTEM32>\ctgoikahqoa.exe
- %TEMP%\eyjkmwn43ytubxyihuws1.exe
- <SYSTEM32>\agrccje\tst
- <SYSTEM32>\ueetohuzfxat.exe
- <SYSTEM32>\agrccje\etc
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\ctgoikahqoa.exe
- <SYSTEM32>\ueetohuzfxat.exe
Deletes the following files:
- %WINDIR%\Temp\eyjkmwn47x6ubxk.exe
- %TEMP%\eyjkmwn43ytubxyihuws1.exe
- <DRIVERS>\etc\hosts
Substitutes the HOSTS file.
Network activity:
Connects to:
- 'tr###telist.com':80
- 'hi###anblog.com':80
- 'tr###entral.com':80
TCP:
HTTP GET requests:
- tr###telist.com/so31/isup.php?v=##################
- hi###anblog.com/so31/isup.php?v=##################
- tr###entral.com/so31/isup.php?v=##################
UDP:
- DNS ASK me#####gintheway.com
- DNS ASK ma#####ousestoday.com
- DNS ASK ad#####edmtleaps.com
- DNS ASK pe####ersonals.com
- DNS ASK ch####rsdolist.com
- DNS ASK tr###entral.net
- DNS ASK bl#####eronredmoon.com
- DNS ASK de###batten.com
- DNS ASK tr###telist.com
- DNS ASK hi###anblog.com
- DNS ASK tr###entral.com
- DNS ASK tr###telost.com
- DNS ASK jo###ryta.com
- DNS ASK co####ertosar.com
- DNS ASK oa####vomurates.com
- '23#.#55.255.250':1900