Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Base Power SNMP Volume IP' = '<SYSTEM32>\dbtmdwjqwh.exe'
Creates or modifies the following files:
- %HOMEPATH%\Start Menu\Programs\Startup\dbtmdwjqwh.exe
Creates the following services:
- [<HKLM>\SYSTEM\ControlSet001\Services\Source Config DLL Assistant DHCP Visual Group] 'Start' = '00000002'
Malicious functions:
To complicate detection of its presence in the operating system,
blocks the following features:
- Windows Security Center
Creates and executes the following:
- '<SYSTEM32>\kuntbewsa.exe' "<SYSTEM32>\dbtmdwjqwh.exe"
- '%WINDIR%\Temp\qsveqacj4t0axrr.exe' -r 38764 tcp
- '%TEMP%\qsveqacj35yfxrv7aiuml.exe'
- '<SYSTEM32>\dbtmdwjqwh.exe'
Modifies file system :
Creates the following files:
- <SYSTEM32>\rhtwwgmcmbjmzha\run
- <SYSTEM32>\rhtwwgmcmbjmzha\rng
- %WINDIR%\Temp\qsveqacj4t0axrr.exe
- <SYSTEM32>\rhtwwgmcmbjmzha\cfg
- <SYSTEM32>\kuntbewsa.exe
- %TEMP%\qsveqacj35yfxrv7aiuml.exe
- <SYSTEM32>\rhtwwgmcmbjmzha\tst
- <SYSTEM32>\dbtmdwjqwh.exe
- <SYSTEM32>\rhtwwgmcmbjmzha\etc
Sets the 'hidden' attribute to the following files:
- <SYSTEM32>\kuntbewsa.exe
- <SYSTEM32>\dbtmdwjqwh.exe
Deletes the following files:
- %WINDIR%\Temp\qsveqacj4t0axrr.exe
- <DRIVERS>\etc\hosts
- %TEMP%\qsveqacj35yfxrv7aiuml.exe
Substitutes the HOSTS file.
Network activity:
Connects to:
- 'do####club-grup.com':80
TCP:
HTTP GET requests:
- do####club-grup.com/forum/search.php?me#########################################
UDP:
- DNS ASK vi###mojo.com
- DNS ASK mo###uia.com
- DNS ASK fa###ompe.net
- DNS ASK am###stol.com
- DNS ASK mo###itio.com
- DNS ASK do####club-grup.com
- DNS ASK el#####arimagine.com
- DNS ASK ja###uter.com
- '23#.#55.255.250':1900