Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'Run' = '<LS_APPDATA>\MobileOptionPack\MOBILE~1.PIF'
Malicious functions:
Creates and executes the following:
- '<LS_APPDATA>\MobileOptionPack\MobileOptionPack.pif'
Executes the following:
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram program = "<SYSTEM32>\svchost.exe" name = "Generic Host Process" mode = ENABLE scope = ALL
- '%WINDIR%\explorer.exe'
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system :
Creates the following files:
- <LS_APPDATA>\MobileOptionPack\MobileOptionPack.pif
Deletes itself.
Network activity:
Connects to:
- 'wi####stimesync.cc':80
TCP:
HTTP POST requests:
- wi####stimesync.cc/common/timestamp.php
UDP:
- DNS ASK wi####stimesync.cc