Technical Information
Malicious functions:
Creates and executes the following:
- %TEMP%\downloader.exe (downloaded from the Internet)
Modifies file system :
Creates the following files:
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\ec702f375e1b12d218f67ab9ef19ca23_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\update[1].gif
- %TEMP%\downloader.exe
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\341d57b5-0267-4e20-899e-911a8a606665
- %APPDATA%\Microsoft\Protect\S-1-5-21-2052111302-484763869-725345543-1003\Preferred
Deletes the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\update[1].gif
Network activity:
Connects to:
- '95.##1.160.38':9955
- 'wi####atenow.com':80
- 'www.ip###cation.com':80
TCP:
HTTP GET requests:
- wi####atenow.com/update.gif
- www.ip###cation.com/
UDP:
- DNS ASK wi####atenow.com
- DNS ASK www.ip###cation.com
- '<Private IP address>':1037
- '<Private IP address>':1036