Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\myDisk\drivers.exe
Malicious functions:
Executes the following:
- '<SYSTEM32>\cmd.exe' /C echo. > "%APPDATA%\SecureCam.exe":Zone.Identifier
Modifies file system:
Creates the following files:
- %TEMP%\delph1.dat
- %TEMP%\pd4ta.dat
- %TEMP%\pd4ta.bin
- %TEMP%\aut5.tmp
- %APPDATA%\SecureCam.exe
- %APPDATA%\07E721AE1943BE7380C25530D4BE8A21
- %TEMP%\jvwjkmn
- %TEMP%\aut2.tmp
- %TEMP%\omivifh
- %TEMP%\aut1.tmp
- %TEMP%\delphi.au3.509
- %TEMP%\aut4.tmp
- %TEMP%\delph1.bin
- %TEMP%\aut3.tmp
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\myDisk\drivers.exe
- <Drive name for removable media>:\autorun.inf
- <Full path to file>
- %TEMP%\pd4ta.dat
Deletes the following files:
- %TEMP%\aut4.tmp
- %TEMP%\aut5.tmp
- %TEMP%\jvwjkmn
- %TEMP%\aut3.tmp
- %TEMP%\aut1.tmp
- %TEMP%\omivifh
- %TEMP%\aut2.tmp
Network activity:
Connects to:
- '74.##5.232.51':80
TCP:
HTTP GET requests:
- http://google.com/ via 74.##5.232.51
UDP:
- DNS ASK google.com