First posted on 01 March 2007.
Source: SecurityHome
Viking.H is also known as DR/Muldrop.1417.C, W32/Viking.I, Win32/Viking.H, W32/Looked.B, PE_LEGMIR.KO, W32.Looked.H, Worm.Win32.Viking.h, W32/Philis-K, W32/HLLP.Philis.q, W32/Viking.J, W32.Philis.P.
Viking.H, a variant of Viking, is a Virus. Viking.H creates files in the Windows directory and downloads and runs a file from website: [http://www.54088.org/backup/[REMOVED]1.exe
Viking.H kills processes belonging to anti-virus and security software.
cription
Once an infected file is executed, Viking.H will drop the following files in the Windows directory:
- Logo1_.exe - Infector
- vDll.dll - Downloader
The .DLL component is injected into IEXPLORE.EXE.
Viking.H adds the following registry entry as a part of its installation:
- [HKLMSOFTWARESoftDownloadWWW]
auto = "1"
It creates the following text files where it writes some information related to its activities:
Viking.H is a prepending virus that searches for files starting from fixed drives from the Z: to C: drives.
It infects files with the following extension:
It avoids infecting files with the following strings in its path or filename:
- Program Files
- Common Files
- ComPlus Applications
- Documents and Settings
- InstallShield Installation Information
- Internet Explorer
- Messenger
- Microsoft Frontpage
- Microsoft Office
- Movie Maker
- MSN
- MSN Gaming Zone
- NetMeeting
- Outlook Express
- Recycled
- system
- System Volume Information
- system32
- windows
- Windows Media Player
- Windows NT
- WindowsUpdate
- winnt
In order for the host file to execute, Viking.H creates a backup copy of the itself in the current directory as [filename].exe.exe and then drops and executes the original uninfected host file as [filename].exe. After which, it will now delete the uninfected host file and renames the backup file to the original filename. Viking.H is able to do this with the help of a temporary batch file created in the temporary folder as $$.bat.
Viking.H sends the message "Hello, World" to the following IP address via Internet Control Message Protocol (ICMP) :
It also attempts to propagate via network shares by copying itself to the following shared folders:
- with the following accounts:
It stops the following service:
- "Kingsoft AntiVirus Service"
It terminates the following processes that are often related to Anti-virus products:
- EGHOST.EXE
- IPARMOR.EXE
- KAVPFW.EXE
- MAILMON.EXE
- RavMon.exe
- RavMonClass
Viking.H attempts to download and execute files from the following site:
- http://www.54088.org/backup/[REMOVED]1.exe
Note: This site is already down.
Last update 01 March 2007
TOP