Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'updater' = '<SYSTEM32>\acrobat.com'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'updater' = '%APPDATA%\readere_lm.com'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\Driver_Update.exe
Malicious functions:
To complicate detection of its presence in the operating system,
forces the system hide from view:
- hidden files
Modifies file system :
Creates the following files:
- %APPDATA%\dbf.nbc
- %APPDATA%\dbf.nty
- %APPDATA%\readere_lm.com
- <SYSTEM32>\acrobat.com
Sets the 'hidden' attribute to the following files:
- %APPDATA%\dbf.nbc
- %APPDATA%\dbf.nty
- <Full path to virus>
- <Drive name for removable media>:\Driver_Update.exe
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: '<SYSTEM32>\cmd.exe'
- ClassName: '' WindowName: 'Windows Task Manager'
- ClassName: 'ToolbarWindow32' WindowName: ''
- ClassName: '' WindowName: 'Registry Editor'
- ClassName: 'SysPager' WindowName: ''
- ClassName: 'Indicator' WindowName: ''
- ClassName: 'nanny boy' WindowName: ''
- ClassName: 'TrayNotifyWnd' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''