Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
- %ALLUSERSPROFILE%\Start Menu\Programs\Startup\kjmscg.exe
Creates the following files on removable media:
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\1234.exe
Malicious functions:
Creates and executes the following:
- C:\spty.exe
- C:\spty.exe (downloaded from the Internet)
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\lol[1].exe
- C:\spty.exe
- C:\1234.exe
- C:\Autorun.inf
Sets the 'hidden' attribute to the following files:
- %ALLUSERSPROFILE%\Start Menu\Programs\Startup\kjmscg.exe
- C:\spty.exe
- <Drive name for removable media>:\1234.exe
- <Full path to virus>
- C:\1234.exe
Network activity:
Connects to:
- 'x0####z.no-ip.biz':80
- 'localhost':1036
TCP:
HTTP GET requests:
- x0####z.no-ip.biz/lol.exe
UDP:
- DNS ASK x0####z.no-ip.biz