La mia libreria
La mia libreria

+ Aggiungi alla libreria

Supporto
Supporto 24/7 | Regole per contattare

Richieste

Profile

Win32.HLLM.Reset.729

Aggiunto al database dei virus Dr.Web: 2017-12-24

La descrizione è stata aggiunta:

Technical Information

To ensure autorun and distribution:
Creates the following services:
  • [<HKLM>\SYSTEM\ControlSet001\Services\hlichbja] 'ImagePath' = '<SYSTEM32>\hlichbja\sqccyy.exe'
  • [<HKLM>\SYSTEM\ControlSet001\Services\hlichbja] 'ImagePath' = '<SYSTEM32>\hlichbja\sqccyy.exe /d"<Full path to file>"'
  • [<HKLM>\SYSTEM\ControlSet001\Services\hlichbja] 'Start' = '00000002'
Malicious functions:
Injects code into
the following system processes:
  • <SYSTEM32>\svchost.exe
Modifies file system:
Creates the following files:
  • %TEMP%\sqccyy.exe
Deletes the following files:
  • <Full path to file>
Moves the following files:
  • from %TEMP%\sqccyy.exe to <SYSTEM32>\hlichbja\sqccyy.exe
Network activity:
Connects to:
  • '43.#31.5.6':465
  • '10#.#3.124.135':465
Miscellaneous:
Creates and executes the following:
  • '<SYSTEM32>\hlichbja\sqccyy.exe' /d"<Full path to file>"
Executes the following:
  • '<SYSTEM32>\sc.exe' description hlichbja "Internet Mobile Support"
  • '<SYSTEM32>\sc.exe' start hlichbja
  • '<SYSTEM32>\svchost.exe'
  • '<SYSTEM32>\cmd.exe' /C mkdir <SYSTEM32>\hlichbja\
  • '<SYSTEM32>\cmd.exe' /C move /Y "%TEMP%\sqccyy.exe" <SYSTEM32>\hlichbja\
  • '<SYSTEM32>\sc.exe' create hlichbja binPath= "<SYSTEM32>\hlichbja\sqccyy.exe /d\"<Full path to file>\"" type= own start= auto DisplayName= "P2P Support"