Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Spooler] 'ImagePath' = '%WINDIR%\system\svchost.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\cuuhomaytinh.exe
- <Drive name for removable media>:\lehaos.jpg
- <Drive name for removable media>:\Oemlogo.bmp
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\desktop.ini
- <Drive name for removable media>:\usbroot.exe
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\125132.exe'
- '<SYSTEM32>\updatelhs.exe'
- '<SYSTEM32>\125132.exe' (downloaded from the Internet)
- '<SYSTEM32>\updatelhs.exe' (downloaded from the Internet)
Modifies file system :
Creates the following files:
- C:\desktop.ini
- <SYSTEM32>\Oeminfo.ini
- C:\cuuhomaytinh.exe
- C:\Oemlogo.bmp
- C:\lehaos.jpg
- <SYSTEM32>\updatelhs.exe
- %WINDIR%\system\svchost.exe
- <SYSTEM32>\125132.exe
- <SYSTEM32>\Oemlogo.bmp
- <SYSTEM32>\lehaos.jpg
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\usbroot.exe
- <Drive name for removable media>:\desktop.ini
- <Drive name for removable media>:\Oemlogo.bmp
- <Drive name for removable media>:\lehaos.jpg
- <Drive name for removable media>:\Autorun.inf
- C:\desktop.ini
- %WINDIR%\system\svchost.exe
- C:\Oemlogo.bmp
- C:\lehaos.jpg
Deletes the following files:
- <SYSTEM32>\updatelhs.exe
Network activity:
Connects to:
- 'le####.byethost8.com':80
- 'le####.site50.net':80
- 'localhost':1039
TCP:
HTTP GET requests:
- le####.site50.net/autorun/lehaos.zip
- le####.site50.net/autorun/Oemlogo.zip
- le####.site50.net/autorun/Oeminfo.zip
- le####.site50.net/autorun/update.zip
- le####.byethost8.com/autorun/update.zip
- le####.site50.net/autorun/desktop.zip
UDP:
- DNS ASK le####.byethost8.com
- DNS ASK le####.site50.net