Technical Information
To ensure autorun and distribution
Creates the following files on removable media
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\autorun.exe
Malicious functions
Searches for windows to
detect analytical utilities:
- ClassName: 'SmartSniff', WindowName: ''
detect programs and games:
- ClassName: 'gdkWindowToplevel', WindowName: ''
Modifies file system
Creates the following files
- %APPDATA%\user@zygijenyzaq 13.3.txt
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
Sets the 'hidden' attribute to the following files
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\autorun.exe
Deletes the following files
- %APPDATA%\user@zygijenyzaq 13.3.txt
Network activity
TCP
HTTP GET requests
- http://th####atebay.org/top/301
- http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt
UDP
- DNS ASK th####atebay.org