Trojan-Downloader.Win32.Unruy_00d64dea2e

by malwarelabrobot on December 16th, 2013 in Malware Descriptions.

Gen:Variant.Unruy.5 (BitDefender), TrojanDownloader:Win32/Unruy.I (Microsoft), HEUR:Trojan.Win32.Generic (Kaspersky), Trojan-Downloader.Win32.Unruy.q (v) (VIPRE), Trojan.Siggen1.63598 (DrWeb), Gen:Variant.Unruy.5 (B) (Emsisoft), Downloader-BZH.gen.a (McAfee), W32.Unruy.A (Symantec), Trojan-Downloader.Win32.Unruy (Ikarus), Trojan-Downloader:W32/FakeAlert.NV (FSecure), Agent2.AUPL (AVG), Win32:Unruy-W [Trj] (Avast), TROJ_UNRUY.SMKV (TrendMicro), Trojan-Downloader.Win32.Unruy.FD, TrojanDownloaderUnruy.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Summary
Technical Details
Removal Recommendations

MD5: 00d64dea2e54cea94b52c8629575a4e4
SHA1: 8b4479bf06dee2d49d507d02eb2073a94a89d468
SHA256: f1b3d178decef9b9e1c38fdbab6f8d475ced94c0db152b73db83c7bf6d4ad20f
SSDeep: 3072:nAlQTUPEvM/1uCYVtY9fmTjBv0gbdoPmtTBfI2plsDE:AlQTZE/sHY9OTlv0OdoPmtTBpplsDE
Size: 274432 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, UPolyXv05_v6, Armadillov171
Company: WinterSoft
Created at: 2010-04-24 10:44:49
Analyzed on: WindowsXP SP3 32-bit


Summary:

Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.

Payload

No specific payload has been found.

Process activity

The Trojan-Downloader creates the following process(es):

%original file name%.exe:1652

The Trojan-Downloader injects its code into the following process(es):
No processes have been created.

File activity

The process %original file name%.exe:1652 makes changes in the file system.
The Trojan-Downloader creates and/or writes to the following file(s):

Registry activity

The process %original file name%.exe:1652 makes changes in the system registry.
The Trojan-Downloader creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "B8 E7 83 9E 21 7F F9 8E 7C 02 27 4D 1C 8A 06 93"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"

Network activity (URLs)

No activity has been detected.

HOSTS file anomalies

No changes have been detected.

Rootkit activity

No anomalies have been detected.

Propagation


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:1652

  2. Delete the original Trojan-Downloader file.
  3. Delete or disinfect the following files created/modified by the Trojan-Downloader:

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now