Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Win32.HLLW.Autoruner.56836

Added to the Dr.Web virus database: 2011-08-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Cysrun' = '%WINDIR%\Cysrun.exe'
  • [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Cyswin' = '%WINDIR%\Cyswin.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\Cysset.exe
Malicious functions:
Creates and executes the following:
  • %WINDIR%\Cyswin.exe 
  • %WINDIR%\Cysrun.exe 
Modifies file system :
Creates the following files:
  • %TEMP%\Set0x2.dat
  • %TEMP%\aut4.tmp
  • %TEMP%\Set0x8.dat
  • %TEMP%\Setting0x.Conf
  • %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\69I9OPW5\Setting0x[1].Conf
  • %WINDIR%\Cysrun.exe
  • %WINDIR%\Cyswin.exe
  • %TEMP%\aut1.tmp
  • %TEMP%\aut2.tmp
  • %TEMP%\aut3.tmp
  • %TEMP%\Set0x4.dat
Sets the 'hidden' attribute to the following files:
  • %TEMP%\Set0x8.dat
  • <Drive name for removable media>:\Cysset.exe
  • <Drive name for removable media>:\autorun.inf
  • %TEMP%\Set0x2.dat
  • %WINDIR%\Cyswin.exe
  • %TEMP%\Set0x4.dat
  • %WINDIR%\Cysrun.exe
Deletes the following files:
  • %TEMP%\aut4.tmp
  • %TEMP%\Setting0x.Conf
  • %TEMP%\aut3.tmp
  • %TEMP%\aut1.tmp
  • %TEMP%\aut2.tmp
Network activity:
Connects to:
  • 'ir#.##eenode.net':6667
  • 'ns###up.zzl.org':80
TCP:
HTTP GET requests:
  • ns###up.zzl.org/Setting0x.Conf
UDP:
  • DNS ASK ir#.##eenode.net
  • DNS ASK ns###up.zzl.org