Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner1.35738

Added to the Dr.Web virus database: 2013-04-26

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Dlmkbbxsmehtujgm.exe' = '"%APPDATA%\Dlmkbbxsmehtujgm.exe"'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\snkb0pt\snkb0pt.exe
  • <Drive name for removable media>:\snkb0pt\Desktop.ini
Malicious functions:
Creates and executes the following:
  • '%APPDATA%\Dlmkbbxsmehtujgm.exe'
Modifies file system :
Creates the following files:
  • %APPDATA%\Dlmkbbxsmehtujgm.exe
  • %TEMP%\~54812.tmp
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\snkb0pt\snkb0pt.exe
  • %APPDATA%\Dlmkbbxsmehtujgm.exe
Network activity:
Connects to:
  • 'xi##h.com':9000
  • 'ph###beat.su':9000
  • 'gi##sbh.org':9000
  • 'f.###tmoon.pl':9000
  • 's.###hlab.pl':9000
UDP:
  • DNS ASK xi##h.com
  • DNS ASK ph###beat.su
  • DNS ASK gi##sbh.org
  • DNS ASK f.###tmoon.pl
  • DNS ASK s.###hlab.pl
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''