Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.MyBot.805

Added to the Dr.Web virus database: 2009-11-09

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft dll Host Service ' = 'wkssr.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\RunServices] 'Microsoft dll Host Service ' = 'wkssr.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft dll Host Service ' = 'wkssr.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices] 'Microsoft dll Host Service ' = 'wkssr.exe'
Malicious functions:
Creates and executes the following:
  • %WINDIR%\wkssr.exe 288 "<Full path to virus>"
Executes the following:
  • <SYSTEM32>\net1.exe stop "Security Center"
  • <SYSTEM32>\net.exe stop SharedAccess
  • <SYSTEM32>\cmd.exe /c ""c:\a.bat" "
  • <SYSTEM32>\net.exe stop "Security Center"
Terminates or attempts to terminate
the following user processes:
  • mpftray.exe
  • NAVAPW32.EXE
  • GUARD.EXE
  • MCAGENT.EXE
  • smc.exe
  • ZONEALARM.EXE
  • nod32.exe
  • outpost.exe
  • fsav32.exe
  • AVPCC.EXE
  • AVPM.EXE
  • AVGCC32.EXE
  • AVGCTRL.EXE
  • Drwebupw.exe
  • fsav.exe
  • AVSYNMGR.EXE
  • bdss.exe
Modifies file system :
Creates the following files:
  • C:\a.bat
  • %WINDIR%\wkssr.exe
Sets the 'hidden' attribute to the following files:
  • %WINDIR%\wkssr.exe
Network activity:
Connects to:
  • 'ne.##wnsoul.us':7654
UDP:
  • DNS ASK ne.##wnsoul.us
  • '<Private IP address>':1036
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''