JavaScript support is required for our site to be fully operational in your browser.
Trojan.Rmnet.47
Added to the Dr.Web virus database:
2015-03-04
Virus description added:
2016-10-17
Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
[<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'MciGkrwk' = '<LS_APPDATA>\eyqtaont\mcigkrwk.exe'
[<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,<LS_APPDATA>\eyqtaont\mcigkrwk.exe'
Creates or modifies the following files:
%HOMEPATH%\Start Menu\Programs\Startup\mcigkrwk.exe
Creates the following services:
[<HKLM>\SYSTEM\ControlSet001\Services\Micorsoft Windows Service] 'ImagePath' = '%TEMP%\tqgnnosw.sys'
Malicious functions:
To bypass firewall, removes or modifies the following registry keys:
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DisableNotifications' = '00000001'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'DoNotAllowExceptions' = '00000000'
[<HKLM>\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile] 'EnableFirewall' = '00000000'
To complicate detection of its presence in the operating system,
blocks execution of the following system utilities:
Windows Update
Windows Security Center
blocks the following features:
User Account Control (UAC)
Windows Security Center
Executes the following:
'<SYSTEM32>\cmd.exe' /C ""%TEMP%\ekdbmtyq.exe"" admin
'%TEMP%\ekdbmtyq.exe' admin
'<SYSTEM32>\svchost.exe'
'%TEMP%\ekdbmtyq.exe' elevate
Injects code into
the following system processes:
Hooks the following functions in System Service Descriptor Table (SSDT):
NtOpenKey, handler: tqgnnosw.sys
NtCreateKey, handler: tqgnnosw.sys
Modifies file system:
Creates the following files:
%TEMP%\tqgnnosw.sys
%WINDIR%\Temp\6decd52f
%WINDIR%\Temp\7fffffb1
<LS_APPDATA>\eyqtaont\mcigkrwk.exe
%TEMP%\ekdbmtyq.exe
%ALLUSERSPROFILE%\Application Data\bjdwbfvf.log
<LS_APPDATA>\niuydqre.log
Sets the 'hidden' attribute to the following files:
%HOMEPATH%\Start Menu\Programs\Startup\mcigkrwk.exe
Deletes the following files:
Network activity:
Connects to:
'ji####yxjibyd.com':443
'cx#####efolgkokdqy.com':443
'sw###olov.com':443
'ti####axvmhsxtk.com':443
'ou###vkvn.com':443
'tf###oingy.com':443
'sn#####gcwgaafbtqkt.com':443
'kh#####kbwhfdiufhaj.com':443
'74.##5.232.51':80
'uk####gdbdkd.com':443
'ht#####rhtchwlhwklf.com':443
UDP:
DNS ASK nd#####nkplaavqsfa.com
DNS ASK pv###jpvih.com
DNS ASK kt###ueyc.com
DNS ASK mv#####wfkayjrqfni.com
DNS ASK nh####gxtgrnk.com
DNS ASK tt####oohhkrhl.com
DNS ASK yb###abknhn.com
DNS ASK da#####mpfufkvaa.com
DNS ASK ft####jkomqdw.com
DNS ASK sh####mbrgcqoeh.com
DNS ASK de###mdyvt.com
DNS ASK hn#####vhxvuoeuap.com
DNS ASK hc###nlr.com
DNS ASK sj###aml.com
DNS ASK sp####davslss.com
DNS ASK gy####siciis.com
DNS ASK ex#####uxrdvhijan.com
DNS ASK wa#####mnswdmbuhcn.com
DNS ASK fx###tgx.com
DNS ASK rx###xbkc.com
DNS ASK ka#####swjvqgdso.com
DNS ASK mi####cwjddy.com
DNS ASK nw#####ynypuhbpkpx.com
DNS ASK ks####hbmctx.com
DNS ASK bing.com
DNS ASK nj####isfxnxw.com
DNS ASK ku#####xrlyrbffu.com
DNS ASK ry####smekfu.com
DNS ASK ln###rnhb.com
DNS ASK fj###qbvoae.com
DNS ASK ap###ackpqd.com
DNS ASK jp#####akusewlaqfdt.com
DNS ASK an####ojndegpnm.com
DNS ASK rb#####qgsmmnnvfv.com
DNS ASK nk###xbt.com
DNS ASK eo####abjwow.com
DNS ASK rr###trt.com
DNS ASK ld###wwwgw.com
DNS ASK kb###dsc.com
DNS ASK qx####scxhradd.com
DNS ASK qb###pyyooh.com
DNS ASK vr####jxorlyen.com
DNS ASK ca###lnlrou.com
DNS ASK ti####axvmhsxtk.com
DNS ASK ub####qslhqyy.com
DNS ASK mu####pvxvrq.com
DNS ASK em#####wjuvvsvrwj.com
DNS ASK go#####vwvgqlretxd.com
DNS ASK nv###npx.com
DNS ASK vw####yyutodtr.com
DNS ASK ht#####rhtchwlhwklf.com
DNS ASK uk####gdbdkd.com
DNS ASK google.com
DNS ASK kh#####kbwhfdiufhaj.com
DNS ASK sn#####gcwgaafbtqkt.com
DNS ASK sw###olov.com
DNS ASK ou###vkvn.com
DNS ASK ji####yxjibyd.com
DNS ASK tf###oingy.com
DNS ASK cx#####efolgkokdqy.com
DNS ASK pu#####fuxgquhguye.com
DNS ASK cp#####hyrueqcyxnvo.com
DNS ASK oc###ffwnj.com
DNS ASK ya###fejdxs.com
DNS ASK ye#####bbprvybwqn.com
DNS ASK jp####bipilmwsc.com
DNS ASK mf###hnjp.com
DNS ASK ga###slj.com
DNS ASK bx###oxw.com
DNS ASK gv###sip.com
DNS ASK xw####iqjdsxk.com
DNS ASK ld####dyyxacm.com
DNS ASK nc#####piawmchfylsy.com
DNS ASK du#####abkuappgqxhp.com
DNS ASK vo###yqdinl.com
DNS ASK tf####kcgigiey.com
DNS ASK pg###yurf.com
DNS ASK pp####dwufrb.com
DNS ASK ku###xnntsk.com
DNS ASK ls#####qxvmogvxifm.com
Curing recommendations
Windows
macOS
Linux
Android
If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space .
If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.
If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
Switch off your device and turn it on as normal.
Find out more about Dr.Web for Android
このウェブサイトを継続して訪問する場合、訪問者に関する統計データを収集するためのCookieファイルおよび他のテクノロジーを弊社が利用することに同意したものとします。詳細
OK