Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'winlogon' = '%WINDIR%\win_sp.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\Autorun.inf
- <Drive name for removable media>:\<Virus name>.exe
Malicious functions:
Creates and executes the following:
- <Current directory>\server.exe
Modifies file system :
Creates the following files:
- C:\Autorun.inf
- %WINDIR%\win_sp.exe
- <Current directory>\server.exe
- C:\<Virus name>.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\<Virus name>.exe
- <Drive name for removable media>:\Autorun.inf
- C:\<Virus name>.exe
- C:\Autorun.inf
Network activity:
Connects to:
- 'in####ri.no-ip.org':8080
- 'in####ri.no-ip.org':5001
UDP:
- DNS ASK in####ri.no-ip.org
- '<Private IP address>':1036