Technical Information
To ensure autorun and distribution:
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\services\Windows Test My Test 1.0] 'Start' = '00000002'
Malicious functions:
Creates and executes the following:
- '<SYSTEM32>\AliveService.exe'
Executes the following:
- '<SYSTEM32>\wermgr.exe' -queuereporting
Modifies file system :
Creates the following files:
- <SYSTEM32>\RCXF018.tmp
- <SYSTEM32>\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNAY37RJ\ip_3322_net[1]
- <SYSTEM32>\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NL36OFJC\ip_3322_net[1]
- <SYSTEM32>\Black.dll
- <SYSTEM32>\AliveService.exe
Deletes the following files:
- <SYSTEM32>\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NL36OFJC\ip_3322_net[1]
- <SYSTEM32>\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNAY37RJ\ip_3322_net[1]
- <SYSTEM32>\Black.dll
Moves the following files:
- from <SYSTEM32>\RCXF018.tmp to <SYSTEM32>\Black.dll
Deletes itself.
Network activity:
Connects to:
- 'ip.#322.net':80
- 'vi#.#17168.com':8999
TCP:
HTTP GET requests:
- ip.#322.net/
UDP:
- DNS ASK ip.#322.net
- DNS ASK dn#.##ftncsi.com
- DNS ASK vi#.#17168.com
- '22#.0.0.252':5355