Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'SonyAgent' = '<Full path to virus>'
Malicious functions:
Searches for registry branches where third party applications store passwords:
- [<HKCU>\Software\BPFTP\Bullet Proof FTP\Options]
- [<HKCU>\Software\BulletProof Software\BulletProof FTP Client\Options]
- [<HKCU>\Software\BulletProof Software\BulletProof FTP Client\Main]
- [<HKLM>\Software\FlashFXP\3]
- [<HKCU>\Software\BPFTP\Bullet Proof FTP\Main]
- [<HKCU>\Software\BPFTP]
- [<HKCU>\Software\South River Technologies\WebDrive\Connections]
- [<HKCU>\Software\FTP Explorer\Profiles]
- [<HKCU>\Software\FTPWare\COREFTP\Sites]
- [<HKCU>\Software\Martin Prikryl\WinSCP 2\Sessions]
- [<HKCU>\Software\Sota\FFFTP\Options]
- [<HKLM>\Software\FlashFXP]
- [<HKCU>\Software\Far\SavedDialogHistory\FTPHost]
- [<HKCU>\Software\Far2\SavedDialogHistory\FTPHost]
- [<HKCU>\SOFTWARE\Far2\Plugins\FTP\Hosts]
- [<HKCU>\SOFTWARE\Microsoft\MessengerService]
- [<HKCU>\SOFTWARE\Far\Plugins\FTP\Hosts]
- [<HKCU>\Software\Ghisler\Windows Commander]
- [<HKCU>\Software\FlashFXP]
- [<HKCU>\Software\FlashFXP\3]
- [<HKLM>\Software\Ghisler\Total Commander]
- [<HKCU>\Software\Ghisler\Total Commander]
- [<HKLM>\Software\Ghisler\Windows Commander]
Modifies file system :
Creates the following files:
- <DRIVERS>\npf.sys
- <SYSTEM32>\wpcap.dll
- <SYSTEM32>\Packet.dll
Sets the 'hidden' attribute to the following files:
- <Full path to virus>
Network activity:
Connects to:
- 'localhost':1077
- '89.##8.144.52':80
- '46.##.75.171':80
- '78.#7.9.4':80
- 'localhost':1080
- '37.#.64.51':80
- 'localhost':1068
- 'localhost':1071
- 'localhost':1074
- '81.##8.146.8':80
- 'localhost':1083
- '77.##8.206.155':80
- 'localhost':1092
- '88.##3.66.31':80
- '93.##3.147.34':80
- '89.##0.40.41':80
- 'localhost':1086
- '12#.#38.177.47':80
- '87.##0.62.10':80
- '46.##2.19.51':80
- 'localhost':1089
- '85.##2.144.8':80
- 'localhost':1044
- '95.#4.6.1':80
- '89.##4.116.17':80
- '10#.87.58.1':80
- 'localhost':1047
- '88.##2.63.21':80
- 'localhost':1035
- 'localhost':1038
- 'localhost':1041
- '93.##5.62.114':80
- 'localhost':1050
- '19#.#38.191.61':80
- 'localhost':1059
- 'localhost':1062
- 'localhost':1065
- '10#.#6.29.184':80
- 'localhost':1053
- '94.##1.240.8':80
- '86.##0.41.54':80
- '95.#5.156.9':80
- 'localhost':1056
TCP:
HTTP GET requests:
- 93.##3.147.34/online.htm
- 89.##0.40.41/online.htm
- 88.##3.66.31/login.htm