Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Active Setup\Installed Components\{85E57092-5125-2E37-B5C6-0706F7BB7A72}] 'stubpath' = ''
Malicious functions:
Executes the following:
- %WINDIR%\explorer.exe
Searches for windows to
detect analytical utilities:
- ClassName: 'pediy06' WindowName: ''
- ClassName: 'GBDYLLO' WindowName: ''
- ClassName: 'OLLYDBG' WindowName: ''
Hides the following processes:
- %PROGRAM_FILES%\Internet Explorer\IEXPLORE.EXE
Modifies file system :
Creates the following files:
- <SYSTEM32>\mdhcp32.exe
- %APPDATA%\mdhcp.dll
Sets the 'hidden' attribute to the following files:
- %APPDATA%\mdhcp.dll
- <SYSTEM32>\mdhcp32.exe
Deletes itself.
Network activity:
Connects to:
- 'ic#.##norelist.com':82
UDP:
- DNS ASK ic#.##norelist.com
- '<Private IP address>':1036