Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Win32.HLLW.Autoruner.53378

Added to the Dr.Web virus database: 2011-07-06

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Tshoo' = '"%TEMP%\temper.exe"'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Tshoo' = '"%TEMP%\temper.exe"'
Creates the following files on removable media:
  • <Drive name for removable media>:\bro.doc.vbs
  • <Drive name for removable media>:\Help.hlp.vbs
  • <Drive name for removable media>:\My_Message.doc.vbs
  • <Drive name for removable media>:\My-Account.doc.vbs
  • <Drive name for removable media>:\Not-yet.doc.vbs
  • <Drive name for removable media>:\skajhdjashugdkahusgdnkwuaeq\98duwuhduy7tywgqhjay7tduyhqjwhuyatuywqhgy\qjwhuya.exe
  • <Drive name for removable media>:\skajhdjashugdkahusgdnkwuaeq\98duwuhduy7tywgqhjay7tduyhqjwhuyatuywqhgy\Desktop.ini
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\Ask-me.rtf.vbs
  • <Drive name for removable media>:\forget me.jpg.vbs
Malicious functions:
Creates and executes the following:
  • %WINDIR%\system33.exe (downloaded from the Internet) 
Modifies file system :
Creates the following files:
  • %TEMP%\temper.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\ULU3YH2D\l0d3ee[1].exe
  • <SYSTEM32>\systeme.acm
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\l0d3ee[1].exe
  • %WINDIR%\system33.exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\l0d3ee[1].exe
Sets the 'hidden' attribute to the following files:
  • <SYSTEM32>\systeme.acm
  • <Drive name for removable media>:\skajhdjashugdkahusgdnkwuaeq\98duwuhduy7tywgqhjay7tduyhqjwhuyatuywqhgy\qjwhuya.exe
  • %TEMP%\temper.exe
Deletes the following files:
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\0D6B6PI5\l0d3ee[1].exe
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\l0d3ee[1].exe
Network activity:
Connects to:
  • 'localhost':1040
  • 'i7#.#4sa.com':3921
  • 'li##.co.il':80
  • 'localhost':1036
  • 'ks#.fm':80
TCP:
HTTP GET requests:
  • li##.co.il/blog/wp-content/plugins/root/l0d3ee.exe
  • ks#.fm/l0d3ee.exe
UDP:
  • DNS ASK i7#.#4sa.com
  • DNS ASK li##.co.il
  • DNS ASK ks#.fm
Miscellaneous:
Searches for the following windows:
  • ClassName: 'Indicator' WindowName: ''