Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Microsoft Startup Manager] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- <SYSTEM32>\<Virus name>.exe
Modifies file system :
Creates the following files:
- <SYSTEM32>\ExpIorer.exe
- C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\CJCTQ25G\cfile1.uf@037F094E508BCDB42016AE[1].exe
- <SYSTEM32>\<Virus name>.exe
Network activity:
Connects to:
- 'in###########elopmentenvironment.tistory.com':80
TCP:
HTTP GET requests:
- in###########elopmentenvironment.tistory.com/attachment/cfile1.uf@037F094E508BCDB42016AE.exe
UDP:
- DNS ASK in###########elopmentenvironment.tistory.com