Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\run] '7MB1IE9NO90XJ' = '%APPDATA%\33RY9I7WZX.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run] '7MB1IE9NO90XJ' = '%APPDATA%\33RY9I7WZX.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] '7MB1IE9NO90XJ' = '%APPDATA%\33RY9I7WZX.exe'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '7MB1IE9NO90XJ' = '%APPDATA%\33RY9I7WZX.exe'
Modifies file system :
Creates the following files:
- %TEMP%\33ry9i7wzx.exe.jpg
Moves itself:
- from <Full path to virus> to %APPDATA%\33RY9I7WZX.exe
Network activity:
Connects to:
- 'lu#####vefreshers.com':80
TCP:
HTTP GET requests:
- lu#####vefreshers.com/webcontroller/cmd.php?ke########################
- lu#####vefreshers.com/webcontroller/fg.php?ke##########
- lu#####vefreshers.com/webcontroller/alive.php?ke##############################################################################
UDP:
- DNS ASK lu#####vefreshers.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: '(null)'