Technical Information
To ensure autorun and distribution
Modifies the following registry keys
- [HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Taskman' = '%HOMEPATH%\vjksnu.exe'
Malicious functions
Injects code into
the following system processes:
- %WINDIR%\syswow64\svchost.exe
Modifies file system
Creates the following files
- %HOMEPATH%\vjksnu.exe
Sets the 'hidden' attribute to the following files
- %HOMEPATH%\vjksnu.exe
Network activity
UDP
- DNS ASK sl###.##fehousenumber.com
- DNS ASK mu###.###tal-protection.net.ru
- DNS ASK wo###.rickstudio.ru
- DNS ASK ba####.cocolands.su
- 'sl###.##fehousenumber.com':33111
Miscellaneous
Executes the following
- '%WINDIR%\syswow64\svchost.exe'