La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLW.Autohit.16573

Aggiunto al database dei virus Dr.Web: 2017-09-13

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'Microsoft Update' = '%TEMP%\skyp\Microsoft Update.lnk'
Malicious functions:
Creates and executes the following:
  • 'C:\sswr\Rar.exe' e -p16509408 nvra.rar
  • '<SYSTEM32>\wscript.exe' "C:\sswr\wcdvnb.vbs"
  • '%TEMP%\XOUPLG.exe'
  • '<SYSTEM32>\wscript.exe' "C:\sswr\jbxqo.vbs"
Executes the following:
  • '<SYSTEM32>\cmd.exe' /c ""C:\sswr\elkkck.bat" "
  • '<SYSTEM32>\netsh.exe' advfirewall set allprofiles state off
  • '<SYSTEM32>\rundll32.exe' <SYSTEM32>\shimgvw.dll,ImageView_Fullscreen %TEMP%\DPQRXY.jpg
  • '<SYSTEM32>\cmd.exe' /c ""C:\sswr\brqaz.bat" "
Modifies file system:
Creates the following files:
  • C:\sswr\vp8encoder.dll
  • C:\sswr\wcdvnb.vbs
  • C:\sswr\nvra.rar
  • C:\sswr\jbxqo.vbs
  • C:\sswr\elkkck.bat
  • C:\sswr\orkva.reg
  • C:\sswr\omzmyjo.exe
  • C:\sswr\cqjovddnan.exe
  • C:\sswr\brqaz.bat
  • %TEMP%\aut2.tmp
  • %TEMP%\XOUPLG.exe
  • %TEMP%\aut1.tmp
  • %TEMP%\ztudxky
  • C:\sswr\run.vbs
  • C:\sswr\Rar.exe
  • %TEMP%\aut3.tmp
  • %TEMP%\DPQRXY.jpg
Deletes the following files:
  • %TEMP%\aut3.tmp
  • C:\sswr\jbxqo.vbs
  • C:\sswr\nvra.rar
  • %TEMP%\aut1.tmp
  • %TEMP%\ztudxky
  • %TEMP%\aut2.tmp
Network activity:
Connects to:
  • 'ba####file.ddns.net':443
UDP:
  • DNS ASK ba####file.ddns.net
Miscellaneous:
Searches for the following windows:
  • ClassName: 'EDIT' WindowName: ''