Submission Summary:

What's been foundSeverity Level
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Threat CategoryDescription
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Programs%\Startup\Sound Player.Lnk 1,557 bytes MD5: 0x09945158E73F65BFA8961A35632F90F8
SHA-1: 0x61F8039513CA76CCB6008274F20ED33D5116FEA2
(not available)
2 %Programs%\Startups\desktop.ini 84 bytes MD5: 0xD6A6856702E3F0953E7246A9B4A9FE35
SHA-1: 0x95E17541FB7200ACFEA240430EC01778FE9BF2FE
(not available)
3 %UserProfile%\Wins7\msmm.exe 823,296 bytes MD5: 0xEFA19E79DBF5FAB116DD6CDAE1103A76
SHA-1: 0x319ED770F556E8C3C1FA862B7EA8AE9385C7D032
Trojan.Win32.VB.argu [Kaspersky Lab]
W32/Vesenlosow.worm [McAfee]
Worm:Win32/Vesenlosow.A [Microsoft]
Trojan.Win32.VB [Ikarus]
4 %UserProfile%\Wins7\shin\sss.col 90 bytes MD5: 0xE4F7EA62F5B32E6A2EC8299616A55A23
SHA-1: 0x8571E0F6F1C8716D4265179D1A08EA68311BA8C6
(not available)
5 [file and pathname of the sample #1] 823,296 bytes MD5: 0x48F95BB77AFFB939EDC6310EBB50BCD2
SHA-1: 0xD7D4A93C59389A13B15699AE9D67E89E1C73BF9F
Trojan.Win32.VB.argu [Kaspersky Lab]
W32/Vesenlosow.worm [McAfee]
Worm:Win32/Vesenlosow.A [Microsoft]
Trojan.Win32.VB [Ikarus]

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.