Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Call (RPC)] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\<Virus name>.exe'
Modifies file system :
Creates the following files:
- C:\autorun.inf
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\unitpass[1].exe
- <SYSTEM32>\paks.exe
- <SYSTEM32>\<Virus name>.exe
- <SYSTEM32>\Autorun.inf
- C:\<Virus name>.exe
Sets the 'hidden' attribute to the following files:
- C:\autorun.inf
- C:\<Virus name>.exe
Network activity:
Connects to:
- 'mi####ft.siteem.com':80
- 'localhost':1035
TCP:
HTTP GET requests:
- mi####ft.siteem.com/other/unitpass.exe
UDP:
- DNS ASK mi####ft.siteem.com