Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLM.Netsky.61985

Added to the Dr.Web virus database: 2016-05-25

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'QQF007' = '%CommonProgramFiles%\System\QQTC32.exe'
Malicious functions:
Executes the following:
  • '<SYSTEM32>\cmd.exe' /c "%TEMP%\015.exe.bat"
  • '<SYSTEM32>\attrib.exe' -s -h -a "%TEMP%\015.exe"
  • '%TEMP%\015.exe'
  • '%CommonProgramFiles%\System\QQTC32.exe'
Modifies file system:
Creates the following files:
  • %CommonProgramFiles%\System\htrn_jis.dll
  • %CommonProgramFiles%\System\htrn_jis.tmp
  • %CommonProgramFiles%\System\ie.dll
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\ie[1].dll
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\sms[1].jpg
  • %CommonProgramFiles%\System\QQTC32.exe
  • %TEMP%\015.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\count[1].asp
  • %TEMP%\015.exe.bat
Deletes the following files:
  • %TEMP%\015.exe
  • %CommonProgramFiles%\System\htrn_jis.tmp
Network activity:
Connects to:
  • 'www.ba###-002.cn':80
TCP:
HTTP GET requests:
  • http://www.ba###-002.cn/sms/ie.dll
  • http://www.ba###-002.cn/sms/sms.jpg
  • http://www.ba###-002.cn/count/count.asp?cm###
UDP:
  • DNS ASK www.ba###-002.cn