Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\dadyzyvftq] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- '%TEMP%\qibofxc.exe' -svc
Modifies file system :
Creates the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\load[1]
- %TEMP%\qibofxc.exe
Deletes the following files:
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\load[1]
- <SYSTEM32>\PerfStringBackup.TMP
- <SYSTEM32>\wbem\Performance\WmiApRpl.ini
Network activity:
Connects to:
- 'pi##.uqrzo.com':80
TCP:
HTTP GET requests:
- pi##.uqrzo.com/load/?dl#########################
UDP:
- DNS ASK pi##.uqrzo.com