Technical Information
Malicious functions:
Executes the following:
- <SYSTEM32>\cmd.exe /c ""<Current directory>\qwe.bat" "<Full path to virus>""
Modifies file system :
Creates the following files:
- <DRIVERS>\down\141640.exe
- <Current directory>\qwe.bat
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\mlie[1].php
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\mlie[1].php
- <DRIVERS>\down\135609.exe
Deletes itself.
Network activity:
Connects to:
- 'ra###nskiy.com':80
- 'ku####oto-engel.com':80
- 'localhost':1035
TCP:
HTTP GET requests:
- ra###nskiy.com/images/mlie.php
- ku####oto-engel.com/images/mlie.php
UDP:
- DNS ASK ra###nskiy.com
- DNS ASK ku####oto-engel.com
- '<Private IP address>':1036