Submission Summary:

What's been foundSeverity Level
Sets the drive to autoplay by creating autorun.inf file in its root directory. If the drive is shared across the network then other remote computers can be infected any time they try to access this share.
Downloads/requests other files from Internet.
Creates a startup registry entry.
Contains characteristics of an identified security risk.


Technical Details:


Possible Security Risk

Security RiskDescription
Trojan-PWS.Onlinegames.BS Trojan.PWS.Onlinegames.BS is a Trojan that will start itself automatically and steal passwords of onlinegames on the infected machines.
Trojan-PWS.OnlineGames.ARUN Trojan-PWS.OnlineGames.ARUN attempts to steal password information associated to popular online games such as MapleStory, Legend of Mir and World of Warcraft. It has the ability to spread itself via removable disk such as USB drives.

Threat CategoryDescription
A network-aware worm that attempts to replicate across the existing network(s)
A code with the rootkit-specific techniques designed to hide the software presence in the system
A hacktool that could be used by attackers to break into a system
A malicious trojan horse or bot that may represent security risk for the compromised system and/or its network environment
A keylogger program that can capture all user keystrokes (including confidential details such username, password, credit card number, etc.)


File System Modifications

#Filename(s)File SizeFile HashAlias
1 c:\autorun.inf 319 bytes MD5: 0x3F11F1940C6E520CB0C67AE0A76660DA
SHA-1: 0xA6D12BE1751A01FCC7260D2E4DF79AAFBC8C9B13
Worm.Win32.AutoRun.bnq [Kaspersky Lab]
Mal/AutoInf-A, Mal/AutoInf-B [Sophos]
Worm.Win32.AutoRun [Ikarus]
2 %Temp%\chjbrh.dll 31,704 bytes MD5: 0x8951EF2175217B174DFC63178B8CD931
SHA-1: 0x299CE48092D6BA564A0A3DABFBC62477AABB46F8
Trojan.Onlinegames.Gen!Pac.73 [PCTools]
Hacktool.Rootkit [Symantec]
Rootkit.Win32.Agent.tq [Kaspersky Lab]
PWS-Gamania.gen.a [McAfee]
Mal/EncPk-CE [Sophos]
VirTool:Win32/Vanti.gen!D [Microsoft]
Worm.Win32.AutoRun [Ikarus]
Win-Trojan/MalPacked.Gen [AhnLab]
3 c:\u.bat
[file and pathname of the sample #1]
105,325 bytes MD5: 0xC7F6B78C10AEE3608315D82CD8E36A08
SHA-1: 0x68770591329C80FD5D8EF30EE1B4580836B67A8E
Trojan.Lineage.Gen!Pac.3 [PCTools]
Trojan.Packed.NsAnti [Symantec]
Trojan-GameThief.Win32.OnLineGames.ngm [Kaspersky Lab]
PWS-Gamania.gen.a [McAfee]
Mal_NSAnti-1 [Trend Micro]
Mal/EncPk-CE [Sophos]
Worm:Win32/Taterf.CN [Microsoft]
Win-Trojan/KorGameHack.105325 [AhnLab]
4 %System%\amvo0.dll
54,784 bytes MD5: 0x2F3B3F725BCF68AE0E4B0D56F2B64A98
SHA-1: 0x52302272041EF34A0B598452F51F3FB1A540C2D2
Trojan.Lineage.Gen!Pac.3 [PCTools]
Infostealer.Gampass [Symantec]
Trojan-GameThief.Win32.OnLineGames.nij [Kaspersky Lab]
PWS-Gamania.gen.a [McAfee]
Mal_NSAnti-1 [Trend Micro]
Mal/EncPk-CE [Sophos]
Worm:Win32/Taterf.B.dll [Microsoft]
Trojan-GameThief.Win32.OnLineGames [Ikarus]
Win-Trojan/OnlineGameHack.54784 [AhnLab]


Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]184,320 bytes
iexplore.exe%ProgramFiles%\Internet Explorer\iexplore.exe102,400 bytes
amvo.exe%System%\amvo.exe184,320 bytes


Registry Modifications


Other details

URL to be downloadedFilename for the downloaded bits\help.rar



All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2015 ThreatExpert. All rights reserved.