Susp_Dropper (Kaspersky), LooksLike.Win32.Malware!B (v) (VIPRE), Email-Worm.Win32.Brontok!IK (Emsisoft), Virus.Win32.Duel.FD, GenericEmailWorm.YR, GenericIRCBot.YR (Lavasoft MAS)Behaviour: Worm, Email-Worm, EmailWorm, Virus, IRCBot
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 290de450576a929b1df2a259557408a8
SHA1: d4fcc4d389841bfc5a66396f85944b7f164da0cd
SHA256: 6c0c650e269a4476e548f3cb0502a0d362e49512a208bedc21c8c8ce8a56361a
SSDeep: 768:pz/oaCWd3QUvpKV2GazNeWM7wXzBG10mY8a2rrHa2:p/ldgUhu2XzUB70mYJ2
Size: 48640 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: no data
Summary: Virus. A program that recursively replicates a possibly evolved copy of itself.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
EmailWorm | Worm can send e-mails. |
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Virus creates the following process(es):
290de450576a929b1df2a259557408a8.exe:1124
aibyqyajq.iaq:468
aibyqyajq.iaq:940
File activity
The process 290de450576a929b1df2a259557408a8.exe:1124 makes changes in a file system.
The Virus creates and/or writes to the following file(s):
C:\Perl\bin\jjrrzqyja.aar (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yjzbyjaya.yar (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Common Files\Adobe\Updater6\qyrabrrar.arq (48 bytes)
%Program Files%\Wireshark\jjrrzqyja.aar (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\aibyqyajq.iaq (48 bytes)
%Program Files%\Wireshark\qyrabrrar.arq (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\aibyqyajq.iaq (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\jjrrzqyja.aar (48 bytes)
%Program Files%\Opera\updatechecker\izarrrzii.irr (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\yqabijraz.yiy (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\abriazzza.ribjaya.yar (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\jjrrzqyja.aar (48 bytes)
%WinDir%\Network Diagnostic\qyrabrrar.arq (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yqabijraz.yiy (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A93000000001}\yjzbyjaya.yarza.ribjaya.yar (48 bytes)
C:\totalcmd\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Wireshark\izarrrzii.irr (48 bytes)
%WinDir%\Microsoft.NET\Framework\jjrrzqyja.aar (48 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Wireshark\aibyqyajq.iaq (48 bytes)
%Program Files%\Wireshark\yqabijraz.yiy (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\izarrrzii.irr (48 bytes)
%Program Files%\WinPcap\qjyzbzbyq.qjbarq (48 bytes)
%WinDir%\xwrm.exe (48 bytes)
C:\Perl\bin\qyrabrrar.arq (48 bytes)
D:\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\yjzbyjaya.yar (48 bytes)
C:\Perl\bin\izarrrzii.irr (48 bytes)
%Program Files%\Wireshark\abriazzza.rib (48 bytes)
%Program Files%\Windows NT\qyrabrrar.arq (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Reader9\yjzbyjaya.yar (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\abriazzza.rib (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\izarrrzii.irr (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\yqabijraz.yiy (48 bytes)
C:\totalcmd\jjrrzqyja.aar (48 bytes)
C:\totalcmd\aibyqyajq.iaq (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\yjzbyjaya.yar (48 bytes)
The process aibyqyajq.iaq:468 makes changes in a file system.
The Virus creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\aijijy.zzra.iaj (48 bytes)
The process aibyqyajq.iaq:940 makes changes in a file system.
The Virus creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\zaqqya.zaaa.iaj (48 bytes)
Registry activity
The process 290de450576a929b1df2a259557408a8.exe:1124 makes changes in a system registry.
The Virus creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "25 58 7C FE 5E B2 86 0C CF D1 CC 78 75 C9 28 C8"
To automatically run itself each time Windows is booted, the Virus adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"x32x" = "%WinDir%\xwrm.exe"
Network activity (URLs)
No activity has been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
290de450576a929b1df2a259557408a8.exe:1124
aibyqyajq.iaq:468
aibyqyajq.iaq:940 - Delete the original Virus file.
- Delete or disinfect the following files created/modified by the Virus:
C:\Perl\bin\jjrrzqyja.aar (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yjzbyjaya.yar (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Common Files\Adobe\Updater6\qyrabrrar.arq (48 bytes)
%Program Files%\Wireshark\jjrrzqyja.aar (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\aibyqyajq.iaq (48 bytes)
%Program Files%\Wireshark\qyrabrrar.arq (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\aibyqyajq.iaq (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\jjrrzqyja.aar (48 bytes)
%Program Files%\Opera\updatechecker\izarrrzii.irr (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\yqabijraz.yiy (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\abriazzza.ribjaya.yar (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\jjrrzqyja.aar (48 bytes)
%WinDir%\Network Diagnostic\qyrabrrar.arq (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\yqabijraz.yiy (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A93000000001}\yjzbyjaya.yarza.ribjaya.yar (48 bytes)
C:\totalcmd\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Wireshark\izarrrzii.irr (48 bytes)
%WinDir%\Microsoft.NET\Framework\jjrrzqyja.aar (48 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\qjyzbzbyq.qjb (48 bytes)
%Program Files%\Wireshark\aibyqyajq.iaq (48 bytes)
%Program Files%\Wireshark\yqabijraz.yiy (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\izarrrzii.irr (48 bytes)
%Program Files%\WinPcap\qjyzbzbyq.qjbarq (48 bytes)
%WinDir%\xwrm.exe (48 bytes)
C:\Perl\bin\qyrabrrar.arq (48 bytes)
D:\qyrabrrar.arq (48 bytes)
%Program Files%\Common Files\Microsoft Shared\DW\yjzbyjaya.yar (48 bytes)
C:\Perl\bin\izarrrzii.irr (48 bytes)
%Program Files%\Wireshark\abriazzza.rib (48 bytes)
%Program Files%\Windows NT\qyrabrrar.arq (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Reader9\yjzbyjaya.yar (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\abriazzza.rib (48 bytes)
%Program Files%\Adobe\Reader 9.0\Reader\izarrrzii.irr (48 bytes)
%Program Files%\Common Files\Adobe\ARM\1.0\yqabijraz.yiy (48 bytes)
C:\totalcmd\jjrrzqyja.aar (48 bytes)
C:\totalcmd\aibyqyajq.iaq (48 bytes)
%WinDir%\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0300000010\9.3.0\yjzbyjaya.yar (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\aijijy.zzra.iaj (48 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\zaqqya.zaaa.iaj (48 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"x32x" = "%WinDir%\xwrm.exe"