Technical Information
To ensure autorun and distribution:
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\system.dll
Malicious functions:
Executes the following:
- %WINDIR%\explorer.exe /idlist,:340:2828,<Current directory>\
- %WINDIR%\explorer.exe
Terminates or attempts to terminate
the following system processes:
- %WINDIR%\Explorer.EXE
Modifies file system :
Creates the following files:
- %WINDIR%\twain_86.dll
- %WINDIR%\clbcatq.dll
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\system.dll
Network activity:
Connects to:
- '25#.#55.255.255':1701
- 'ss###w.co.cc':80
- 'ss###w.co.cc':1701
TCP:
HTTP GET requests:
- ss###w.co.cc/l.php?v=#####################################
UDP:
- DNS ASK df####tjj-ltd.org
- DNS ASK je#####hfdmkuioy.co.cc
- DNS ASK ss###w.co.cc
- '<Private IP address>':1040
- '<Private IP address>':1037
- '<Private IP address>':1039
- '<Private IP address>':1038
- '<Private IP address>':1036
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: ''
- ClassName: 'OleMainThreadWndClass' WindowName: ''
- ClassName: 'CSCHiddenWindow' WindowName: ''
- ClassName: 'SystemTray_Main' WindowName: ''
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Proxy Desktop' WindowName: ''
- ClassName: 'SysListView32' WindowName: ''
- ClassName: 'BaseBar' WindowName: 'ChanApp'