Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'shell' = '%SystemRoot%\system32\user32.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\md.exe
Malicious functions:
Executes the following:
- <SYSTEM32>\taskkill.exe /im taskmgr.exe /f
- <SYSTEM32>\taskkill.exe /im regedit.exe /f
- <SYSTEM32>\taskkill.exe /im narrator.exe /f
- <SYSTEM32>\taskkill.exe /im sethc.exe /f
- <SYSTEM32>\taskkill.exe /im utilman.exe /f
Hides the following processes:
- <SYSTEM32>\cmd.exe
Modifies file system :
Creates the following files:
- %WINDIR%\Debug\sys.exe
- %WINDIR%\Debug\UserMode\explorer.exe
- <SYSTEM32>\user32.exe
- <SYSTEM32>\enabled.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\sms[1].txt
- <SYSTEM32>\ver.ini
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\enabled[1].txt
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\md.exe
Network activity:
Connects to:
- 'ho##.far.ru':80
- 'localhost':1035
TCP:
HTTP GET requests:
- ho##.far.ru/enabled.txt
- ho##.far.ru/sms.txt
UDP:
- DNS ASK ho##.far.ru
Miscellaneous:
Searches for the following windows:
- ClassName: '' WindowName: ''
- ClassName: 'MS_WebcheckMonitor' WindowName: ''
- ClassName: 'MS_AutodialMonitor' WindowName: ''