Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SunJavaUpdateSched' = '%APPDATA%\winsec.exe'
Creates the following files on removable media:
- <Drive name for removable media>:\rkcybere.rkr
- <Drive name for removable media>:\nhgbeha.vas
- <Drive name for removable media>:\explorer.exe
- <Drive name for removable media>:\autorun.inf
Malicious functions:
Creates and executes the following:
- %APPDATA%\winsec.exe
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system :
Creates the following files:
- %TEMP%\windump.exe
- %APPDATA%\winsec.exe
Sets the 'hidden' attribute to the following files:
- <Drive name for removable media>:\rkcybere.rkr
- <Drive name for removable media>:\explorer.exe
- %APPDATA%\winsec.exe
Network activity:
Connects to:
- '14#.#45.148.207':4444
- '84.##.37.209':4444
- '14#.#07.114.202':4444
- '14#.#55.170.103':4444
- '18#.#97.17.209':4444
- 'ef###.xs4all.nl':6667
- 'rs###.kf4nyy.ay':6667
- '19#.#45.73.110':4444
- '10#.24.91.9':4444
- '22#.#5.96.48':4444
- '15#.#27.245.219':4444
- '<Private IP address>':80
- '<Private IP address>':445
- '14#.#8.190.115':4444
- '13#.#19.96.218':4444
- '11#.#06.60.21':4444
- '18#.#1.78.23':4444
- '11.##6.153.120':4444
- '18#.#3.171.18':4444
UDP:
- DNS ASK rs###.kf4nyy.ay
- DNS ASK ef###.xs4all.nl
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''