Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Security' = '"<Full path to virus>"'
Creates the following files on removable media:
- <Drive name for removable media>:\porn.avi.exe
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\explorer.exe
- <Drive name for removable media>:\over.exe
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\149[1].exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\over.exe
- <Drive name for removable media>:\explorer.exe
Network activity:
Connects to:
- 'ze##mis.ru':80
- 'localhost':1036
TCP:
HTTP GET requests:
- ze##mis.ru/zele/149.exe
UDP:
- DNS ASK ze##mis.ru
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'