Submission Summary:
Submission details:
Submission received: 4 January 2009, 17:50:06
Processing time: 6 min 40 sec
Submitted sample:
File MD5: 0x5BDE110D7C841CFD80EAF448FAF491E2
Filesize: 40,697 bytes
Alias:
Win32.Virut.Gen [PCTools]
W32.Virut.B [Symantec]
Virus.Win32.Virut.n [Kaspersky Lab]
W32/Virut.gen [McAfee]
W32/Vetor-A [Sophos]
Virus:Win32/Virut.AK [Microsoft]
Virus.Win32.Cheburgen.a [Ikarus]
Summary of the findings:
What's been found Severity Level
Communication with a remote IRC server.
Registers a 32-bit in-process server DLL.
Registers a Browser Helper Object (Microsoft's Internet Explorer plugin module).
There were some system executable files modified, which might indicate the presence of a PE-file infector.
Contains characteristics of an identified security risk.
Technical Details:
Possible Security Risk
Attention! Characteristics of the following security risk was identified in the system:
Security Risk Description
Trojan.BHO!sd6 Trojan.BHO!sd6 is a malicious program that does not infect other files but may represents security risk for your computer and/or network environment.
Attention! The following threat categories were identified:
Threat Category Description
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment
A virus capable to modify other files by infecting, prepending, or overwriting them them with its own body
File System Modifications
The following files were created in the system:
# Filename(s) File Size File MD5 Alias
1 %System%\rcsoft32.dll 22,528 bytes 0xF58B2C09D6E86696C78D5F4EC2DC6A72 Trojan.BHO!sd6 [PCTools]
Trojan Horse [Symantec]
Trojan.Win32.BHO.hbl [Kaspersky Lab]
Generic.dx [McAfee]
Mal/Generic-A [Sophos]
Trojan.Win32.BHO.d [Ikarus]
packed with PE_Patch.UPX [Kaspersky Lab]
2 [file and pathname of the sample #1] 40,697 bytes 0x5BDE110D7C841CFD80EAF448FAF491E2 Win32.Virut.Gen [PCTools]
W32.Virut.B [Symantec]
Virus.Win32.Virut.n [Kaspersky Lab]
W32/Virut.gen [McAfee]
W32/Vetor-A [Sophos]
Virus:Win32/Virut.AK [Microsoft]
Virus.Win32.Cheburgen.a [Ikarus]
Note:
%System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).
The following files were modified:
[pathname with a string SHARE]\msinfo32.exe
[pathname with a string SHARE]\sapisvr.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\icwconn1.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\icwconn2.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\icwrmind.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\icwtutor.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\inetwiz.exe
%ProgramFiles%\Internet Explorer\Connection Wizard\isignup.exe
%ProgramFiles%\Internet Explorer\iedw.exe
%ProgramFiles%\MSN\MSNIA\msniasvc.exe
%ProgramFiles%\MSN\MSNIA\prestp.exe
%ProgramFiles%\MSN\MsnInstaller\msninst.exe
%ProgramFiles%\NetMeeting\cb32.exe
%ProgramFiles%\NetMeeting\conf.exe
%ProgramFiles%\NetMeeting\wb32.exe
%ProgramFiles%\Outlook Express\msimn.exe
%ProgramFiles%\Outlook Express\oemig50.exe
%ProgramFiles%\Outlook Express\setup50.exe
%ProgramFiles%\Outlook Express\wab.exe
%ProgramFiles%\Outlook Express\wabmig.exe
%ProgramFiles%\Web Publish\WPWIZ.EXE
%ProgramFiles%\Windows Media Player\migrate.exe
%ProgramFiles%\Windows Media Player\mplayer2.exe
%ProgramFiles%\Windows Media Player\setup_wm.exe
%ProgramFiles%\Windows Media Player\wmplayer.exe
%ProgramFiles%\Windows NT\Accessories\wordpad.exe
%ProgramFiles%\Windows NT\dialer.exe
%ProgramFiles%\Windows NT\hypertrm.exe
%ProgramFiles%\Windows NT\Pinball\PINBALL.EXE
%Windir%\hh.exe
%Windir%\inf\unregmp2.exe
%Windir%\Installer\{350C97B0-3D7C-4EE8-BAA9-00BCB3D54227}\places.exe
%Windir%\Microsoft.NET\Framework\NETFXSBS10.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\aspnet_regbrowsers.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\aspnet_regsql.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\dfsvc.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\IEExec.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\jsc.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
%Windir%\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
%Windir%\msagent\agentsvr.exe
%Windir%\mui\muisetup.exe
%Windir%\NOTEPAD.EXE
%Windir%\pchealth\helpctr\binaries\HelpCtr.exe
%Windir%\pchealth\helpctr\binaries\HelpHost.exe
%Windir%\pchealth\helpctr\binaries\HelpSvc.exe
%Windir%\pchealth\helpctr\binaries\HscUpd.exe
%Windir%\pchealth\helpctr\binaries\msconfig.exe
%Windir%\pchealth\helpctr\binaries\notiflag.exe
%Windir%\pchealth\UploadLB\Binaries\UploadM.exe
%Windir%\regedit.exe
%System%\accwiz.exe
%System%\actmovie.exe
%System%\ahui.exe
%System%\arp.exe
%System%\asr_fmt.exe
%System%\asr_ldm.exe
%System%\asr_pfu.exe
%System%\at.exe
%System%\atmadm.exe
%System%\attrib.exe
%System%\auditusr.exe
%System%\blastcln.exe
%System%\bootcfg.exe
%System%\bootok.exe
%System%\bootvrfy.exe
%System%\cacls.exe
%System%\calc.exe
%System%\charmap.exe
%System%\chkdsk.exe
%System%\chkntfs.exe
%System%\cidaemon.exe
%System%\cipher.exe
%System%\cisvc.exe
%System%\ckcnv.exe
%System%\cleanmgr.exe
%System%\clean_all.exe
%System%\cliconfg.exe
%System%\clipbrd.exe
%System%\clipsrv.exe
%System%\cmd.exe
%System%\cmdl32.exe
%System%\cmmon32.exe
%System%\cmstp.exe
%System%\Com\comrepl.exe
%System%\Com\comrereg.exe
%System%\comp.exe
%System%\compact.exe
%System%\conime.exe
%System%\control.exe
%System%\convert.exe
%System%\cscript.exe
%System%\ctfmon.exe
%System%\dcomcnfg.exe
%System%\ddeshare.exe
%System%\defrag.exe
Notes:
%ProgramFiles% is a variable that refers to the Program Files folder. A typical path is C:\Program Files.
Memory Modifications
There was a new process created in the system:
Process Name Process Filename Main Module Size
[filename of the sample #1] [file and pathname of the sample #1] 69,632 bytes
Registry Modifications
The following Registry Keys were created:
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\InprocServer32
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\ProgID
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\TypeLib
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B200799F-9538-403d-9A6E-36F5942EC540}
HKEY_LOCAL_MACHINE\SOFTWARE\AkrilSoft
The newly created Registry Values are:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\TypeLib]
(Default) = "{02A4DEB7-1FC1-4ca4-A3FA-48B31A7756ED}"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\ProgID]
(Default) = "Ms. plugin"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}\InprocServer32]
(Default) = "%System%\rcsoft32.dll"
ThreadingModel = "Apartment"
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B200799F-9538-403d-9A6E-36F5942EC540}]
(Default) = "pl"
[HKEY_LOCAL_MACHINE\SOFTWARE\AkrilSoft]
RR = 7A 67 60 62 29 3B 3D 64 63 65 3D 64 60 7C 72 7B 67 39 71 72 67 7A 3D 76 7B 69
LM = 3C 3C 3C 3F 39
lib = "}l|`i{<=!kcc"
IDEN = "uL>977H#7;=6#:>=j#7O8K#=8H;7:s"
Other details
Analysis of the file resources indicate the following possible country of origin:
Russian Federation
The following Host Name was requested from a host database:
proxim.ircgalaxy.pl
There was registered attempt to establish connection with the remote host. The connection details are:
Remote Host Port Number
proxim.ircgalaxy.pl 65520
Outbound traffic (potentially malicious)
Attention! There was a new connection established with a remote IRC Server. The generated outbound IRC traffic is provided below:
All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.
The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.
Copyright © 2009 ThreatExpert. All rights reserved.