Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'svchost' = '%PROGRAM_FILES%\svchost\svchost.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\autorun.inf
- <Drive name for removable media>:\svchost.vshost.exe.manifest
Malicious functions:
Executes the following:
- <SYSTEM32>\netsh.exe firewall add allowedprogram program="%PROGRAM_FILES%\svchost\svchost.exe" name="svchost" mode=ENABLE
- <SYSTEM32>\netsh.exe advfirewall firewall add rule name="svchost" dir=in action=allow program="%PROGRAM_FILES%\svchost\svchost.exe" enable=yes
Modifies file system :
Creates the following files:
- %PROGRAM_FILES%\svchost\autorun.inf
- %PROGRAM_FILES%\svchost\svchost.vshost.exe.manifest
Network activity:
Connects to:
- 'ka####.zapto.org':1050
- 'ka####.zapto.org':1055
UDP:
- DNS ASK ka####.zapto.org
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''
- ClassName: 'Indicator' WindowName: ''