Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Win32.HLLW.Siggen.8235

Added to the Dr.Web virus database: 2016-11-08

Virus description added:

Technical Information

To ensure autorun and distribution
Creates or modifies the following files
  • <LS_APPDATA>\start\update_backup.exe
  • <LS_APPDATA>\start\rcx2e84.tmp
Creates the following files on removable media
  • <Drive name for removable media>:\bloc-notes.exe
Malicious functions
To complicate detection of its presence in the operating system,
forces the system hide from view:
  • hidden files
  • file extensions
Modifies file system
Creates the following files
  • %TEMP%\ndoquvepl.resources
  • %TEMP%\vbc1407.tmp
  • %TEMP%\scq50os7.out
  • %TEMP%\scq50os7.cmdline
  • %TEMP%\scq50os7.0.vb
  • %TEMP%\whatdafock.txt
  • %TEMP%\gtdhpmsw.resources
  • %TEMP%\vhjuccz.resources
  • %TEMP%\jzfopfn4.exe
  • %TEMP%\res1427.tmp
  • %TEMP%\resf55.tmp
  • %TEMP%\jzfopfn4.out
  • %TEMP%\jzfopfn4.cmdline
  • %TEMP%\jzfopfn4.0.vb
  • %TEMP%\msnpsharp.dll
  • %TEMP%\730r0.resources
  • <LS_APPDATA>\start\update.exe
  • %TEMP%\svchost.exe
  • %TEMP%\update.exe
  • %TEMP%\vbcf44.tmp
  • %TEMP%\windowsupdate.ico
Deletes the following files
  • %TEMP%\resf55.tmp
  • %TEMP%\vbcf44.tmp
  • %TEMP%\jzfopfn4.0.vb
  • %TEMP%\jzfopfn4.out
  • %TEMP%\jzfopfn4.cmdline
  • %TEMP%\jzfopfn4.exe
  • %TEMP%\res1427.tmp
  • %TEMP%\vbc1407.tmp
  • %TEMP%\scq50os7.0.vb
  • %TEMP%\scq50os7.out
  • %TEMP%\scq50os7.cmdline
  • %TEMP%\vhjuccz.resources
  • %TEMP%\gtdhpmsw.resources
  • %TEMP%\windowsupdate.ico
  • <LS_APPDATA>\start\update.exe
Network activity
Connects to
  • '17#.#3.169.14':80
Miscellaneous
Creates and executes the following
  • '%TEMP%\update.exe'
  • '%TEMP%\svchost.exe'
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\jzfopfn4.cmdline"' (with hidden window)
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RESF55.tmp" "%TEMP%\vbcF44.tmp"' (with hidden window)
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\scq50os7.cmdline"' (with hidden window)
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES1427.tmp" "%TEMP%\vbc1407.tmp"' (with hidden window)
Executes the following
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\jzfopfn4.cmdline"
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RESF55.tmp" "%TEMP%\vbcF44.tmp"
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\vbc.exe' /noconfig @"%TEMP%\scq50os7.cmdline"
  • '%WINDIR%\microsoft.net\framework\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES1427.tmp" "%TEMP%\vbc1407.tmp"