Submission Summary:

What's been foundSeverity Level
Sets the drive to autoplay by creating autorun.inf file in its root directory. If the drive is shared across the network then other remote computers can be infected any time they try to access this share.
Downloads/requests other files from Internet.
Compromises SafeBoot registry key(s) in an attempt to disable the Safe Mode.
Creates a startup registry entry.
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Security RiskDescription
Worm.AutoRun!sd6 Worm.AutoRun!sd6 is a network-aware worm that attempts to replicate across the existing network.

Threat CategoryDescription
A network-aware worm that attempts to replicate across the existing network(s)

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 c:\autorun.inf
%System%\pksetexd.inf
153 bytes MD5: 0x94431E6D077425680EA24AEC7673DB47
SHA-1: 0x74703C5FC3C1AB457C8BCCB746B6551439A5B3D4
INF.Autorun.Gen [PCTools]
Generic!atr [McAfee]
2 c:\kvtrwkcc.exe
%System%\aevqgb.dll
%System%\aevqgb.nls
%System%\kvtrwkcc.exe
%System%\pksetexd.exe
[file and pathname of the sample #1]
67,195 bytes MD5: 0x773DEB311ED59F6D48CCD2EC29241F77
SHA-1: 0x0BDD68760802325B280792B55DE6235FF977E15F
Worm.AutoRun!sd6 [PCTools]
W32.Dotex.CA [Symantec]
Worm.Win32.AutoRun.enw [Kaspersky Lab]
New Malware.aj [McAfee]
Mal/TinyDL-T [Sophos]
Trojan-Downloader.Win32.Zlob [Ikarus]
packed with PE_Patch [Kaspersky Lab]
3 %System%\musz1s.dll
%System%\musz2s.dll
612,352 bytes MD5: 0x3F795D6FB4050C93CBBD0FF699A2635A
SHA-1: 0xD6F6FF1E3809C980CA78710E842AC3F1C1697E92
(not available)

 

Memory Modifications

Process NameProcess FilenameMain Module Size
pksetexd.exe%System%\pksetexd.exe266,240 bytes
[filename of the sample #1][file and pathname of the sample #1]266,240 bytes
kvtrwkcc.exe%System%\kvtrwkcc.exe266,240 bytes
MuTemp.exe%System%\MuTemp.exe266,240 bytes

 

Registry Modifications

 

Other details

China

Server NameServer PortConnect as UserConnection Password
count.xj.cn80(null)(null)
www.gx-ruanjian.com80(null)(null)

 

 

Downloaded File Summary:

What's been foundSeverity Level
Hosts file modification that may block access to the security web sites.
Downloads/requests other files from Internet.
Packed with a packer that is known to be used by malware (e.g. to complicate threat analysis or detection).
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Security RiskDescription
Trojan-Spy.Onlinegame!sd6 Trojan-Spy.Onlinegame!sd6 is a malicious application that attempts to steal passwords, login details, and other confidential information.

Threat CategoryDescription
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment
A keylogger program that can capture all user keystrokes (including confidential details such username, password, credit card number, etc.)
A network-aware worm that attempts to replicate across the existing network(s)

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Temp%\WER72a1.dir00\manifest.txt 1,332 bytes MD5: 0xEEA7B18AFA15D34FDBE2E59641A10B0C
SHA-1: 0xD845783846264B3FBC078EB30A9671526F6A736E
(not available)
2 %Temp%\WER72a1.dir00\sysdata.xml 114,418 bytes MD5: 0x33DC2342F0D6B328A8ECA811CAE5DD37
SHA-1: 0xFDC3A7D598D7FB5FDB1BEECC8007F9500213B070
(not available)
3 %System%\alitte32.dll 35,486 bytes MD5: 0x746327206FCC5D0968ABB0FA5E613206
SHA-1: 0x4428C20B2558B7A12B50A78309C6612024237ED3
Trojan-Spy.Onlinegame!sd6 [PCTools]
Infostealer.Onlinegame [Symantec]
Trojan-Dropper.Win32.Agent.acfe [Kaspersky Lab]
PWS-Mmorpg.gen [McAfee]
Mal/Packer, Mal/Behav-024, Mal/GamePSW-C, Mal/GamePSW-B, Mal/EncPk-BW, Mal/Behav-027, Mal/Emogen-Y, Mal/Behav-010 [Sophos]
Virus.Win32.Virut [Ikarus]
packed with UPack [Kaspersky Lab]
4 %System%\alitte32.exe
[file and pathname of the sample #1]
40,303 bytes MD5: 0xA5AFDCDA7CD029074A913CF08B927CE5
SHA-1: 0x65384A429EA61EB2DD8068091F7FF81D3CA76D92
Trojan-Spy.Onlinegame!sd6 [PCTools]
Infostealer.Onlinegame [Symantec]
Trojan-Spy.Win32.Agent.gmo [Kaspersky Lab]
Generic PWS.y [McAfee]
Mal/Packer [Sophos]
Trojan.Flystudio.AI [Ikarus]
5 %System%\rising.exe
[file and pathname of the sample #3]
40,752 bytes MD5: 0xA65A86E3F5931837C852313EF969C5D3
SHA-1: 0x0085E55516A2ABBA04D24F3EB2B098ABEC59F41A
W32.SillyDC [Symantec]
IRC-Worm.Win32.Delf.q [Kaspersky Lab]
W32/Autorun.worm.c [McAfee]
Mal/TinyDL-T, Mal/Packer, Mal/Behav-024 [Sophos]
Worm:Win32/SillyShareCopy.F [Microsoft]
Trojan-PWS.Win32.QQPass [Ikarus]
packed with Packman [Kaspersky Lab]
6 [file and pathname of the sample #2] 144,170 bytes MD5: 0x35D946EA507A78E10D029E84E310861F
SHA-1: 0x7DB18668B5557F3BDE1432EF8CBBE5BF686F403A
Trojan.Agent.EAQI [PCTools]
Trojan.RAR.Qhost.d [Kaspersky Lab]
Trojan.RAR.Qhost [Ikarus]

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]98,304 bytes
[filename of the sample #2][file and pathname of the sample #2]135,168 bytes

 

Registry Modifications

 

Other details

China

Server NameServer PortConnect as UserConnection Password
lovechina.tw.cn80(null)(null)

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.