Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{019174B5-5DB4-AD46-5A77-51E8D88B0970}] 'StubPath' = '<SYSTEM32>:winsock.exe'
Malicious functions:
Injects code into
the following system processes:
- %WINDIR%\Explorer.EXE
Searches for windows to
detect analytical utilities:
- ClassName: '' WindowName: 'Process Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'RegmonClass' WindowName: ''
- ClassName: '' WindowName: 'Registry Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'FilemonClass' WindowName: ''
- ClassName: '' WindowName: 'File Monitor - Sysinternals: www.sysinternals.com'
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
Modifies file system :
Creates the following files:
- <SYSTEM32>:winsock.exe
Deletes itself.
Network activity:
Connects to:
- 'gz#.#ooo.com':5020
- '<Private IP address>':5020
- 'localhost':5020
- 'gr####ndk.mooo.com':5020
UDP:
- DNS ASK gz#.#ooo.com
- DNS ASK gr####ndk.mooo.com
Miscellaneous:
Searches for the following windows:
- ClassName: '18467-41' WindowName: ''