Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Shell' = 'explorer.exe expl0rer.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\readme.exe
- <Drive name for removable media>:\console.exe
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\scanner.exe
- <Drive name for removable media>:\Message.exe
- <Drive name for removable media>:\avast.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
- file extensions
Terminates or attempts to terminate
the following user processes:
- NAVAPW32.EXE
- mpftray.exe
- GUARD.EXE
- ntvdm.exe
- firefox.exe
- ZONEALARM.EXE
- zapro.exe
- fsav32.exe
- AVP.EXE
- AVGCTRL.EXE
- AVGCC32.EXE
- AVP32.EXE
- AVSYNMGR.EXE
- AVPM.EXE
- AVPCC.EXE
Modifies settings of Windows Explorer:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer] 'NoFolderOptions' = '00000001'
Modifies settings of Windows Internet Explorer:
- [<HKCU>\Software\Microsoft\Internet Explorer\Main] 'Window Title' = 'Berahi kay Nanganal,. Enjoy YOU PORN.COM hahaha! Hacked by: MALWARE INFECTED...'
Sets a new unauthorized home page for Windows Internet Explorer.
Modifies file system :
Creates the following files:
- C:\readme.exe
- C:\avast.exe
- C:\Autorun.inf
- C:\console.exe
- %WINDIR%\expl0rer.exe
- C:\Message.exe
- C:\scanner.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\console.exe
- <Drive name for removable media>:\Autorun.inf
- C:\Autorun.inf
- %WINDIR%\expl0rer.exe
- C:\console.exe
Deletes the following files:
- <Drive name for removable media>:\Autorun.inf
- C:\Autorun.inf
Modifies the HOSTS file.
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: '(null)'