Technical Information
Malicious functions:
Executes the following:
- '<SYSTEM32>\spoolsv.exe'
Modifies file system :
Creates the following files:
- C:\autorun.inf
- C:\resycled\boot.com
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
Sets the 'hidden' attribute to the following files:
- C:\autorun.inf
- C:\resycled\boot.com
Deletes the following files:
- %TEMP%\tmp1.tmp
- %TEMP%\tmp2.tmp
Moves itself:
- from <Full path to virus> to %WINDIR%\Temp\tmp3.tmp
Network activity:
Connects to:
- '94.##7.2.104':80
TCP:
HTTP POST requests:
- http:///cgi-bin/generator via 94.##7.2.104