Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner2.24665

Added to the Dr.Web virus database: 2016-07-10

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '7f9f20165d38d31 PM1' = '%TEMP%\\{1549DF-HFSD7H-83HD76-HDSY093-GSOEPU0}\Windows Defender.exe'
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '7f9f20165d38d31 PM2' = '%TEMP%\\{1549DF-HFSD7H-83HD76-HDSY083-GSOEPU0}\Windows Update.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\run.exe
Malicious functions:
Executes the following:
  • '%TEMP%\{1549DF-HFSD7H-83HD76-HDSY093-GSOEPU0}\Windows Defender.exe'
  • '<Current directory>\NsCpuCNMiner32.exe' -o stratum+tcp://xmr.pool.minergate.com:45560 -u minergatersm@gmail.com -p x
  • '%TEMP%\{1549DF-HFSD7H-83HD76-HDSY083-GSOEPU0}\Windows Update.exe'
Modifies file system:
Creates the following files:
  • <Current directory>\1468111121_log.txt
  • %TEMP%\{1549DF-HFSD7H-83HD76-HDSY093-GSOEPU0}\NsCpuCNMiner32.exe
  • <Current directory>\1468111185_log.txt
  • %TEMP%\System.exe
  • <Current directory>\NsCpuCNMiner32.exe
  • %TEMP%\{1549DF-HFSD7H-83HD76-HDSY083-GSOEPU0}\Windows Update.exe
  • %TEMP%\{1549DF-HFSD7H-83HD76-HDSY093-GSOEPU0}\Windows Defender.exe
Sets the 'hidden' attribute to the following files:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\run.exe
Network activity:
Connects to:
  • 'xm#.###l.minergate.com':45560
  • 'ba####.site88.net':80
  • 'wp#d':80
  • 'mi#####tersm.netau.net':80
TCP:
HTTP GET requests:
  • http://ba####.site88.net/virus/viwer.php?id#################
  • http://mi#####tersm.netau.net//virus/miner.php?id#################
  • http://11#.#11.111.1/wpad.dat via wp#d
UDP:
  • DNS ASK xm#.###l.minergate.com
  • DNS ASK ba####.site88.net
  • DNS ASK wp#d
  • DNS ASK mi#####tersm.netau.net
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''