Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'AntiArp' = '<SYSTEM32>\AntiArp.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\AntiArp.exe
- <Drive name for removable media>:\AutoRun.inf
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\AntiArp.exe'
Executes the following:
- '<SYSTEM32>\cmd.exe' /c %TEMP%\~LoveU!.bat
- '<SYSTEM32>\svchost.exe'
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Terminates or attempts to terminate
the following user processes:
- 360tray.exe
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\sn[1].txt
- <SYSTEM32>\AntiArp.txt
- <SYSTEM32>\AntiArp.exe
- %TEMP%\~LoveU!.bat
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\AntiArp.exe
- %TEMP%\~LoveU!.bat
- <Drive name for removable media>:\AutoRun.inf
- <Drive name for removable media>:\AntiArp.exe
Deletes the following files:
- <SYSTEM32>\AntiArp.txt
- <Drive name for removable media>:\AutoRun.inf
Deletes itself.
Network activity:
Connects to:
- 'localhost':1038
- 'ma##.szsh.com':80
TCP:
HTTP GET requests:
- ma##.szsh.com/en/images/sn.txt
UDP:
- DNS ASK ma##.szsh.com