Home / malware Worm:MSIL/Autorun.AD
First posted on 20 May 2015.
Source: MicrosoftAliases :
There are no other names known for Worm:MSIL/Autorun.AD.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
- %SystemRoot%\tasks\system32.exe
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "%SystemRoot%\Tasks\system32.exe"
With data: "%SystemRoot%\tasks\system32.exe"
Spreads through...
Network and removable drives
This worm can spread by creating files on network or removable drives, such as USB flash drives. For example:
:\very important.exe :\new folder 2.exe :\subst.exe
Payload
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- thevampire_vvv.byethost32.com using port 80
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
This malware description was published using automated analysis of file SHA1 8b91a54ec33a93139acdecb06898e72988630ca2.
Symptoms
The following can indicate that you have this threat on your PC:
- You see a file similar to:
- %SystemRoot%\tasks\system32.exe
- You see registry modifications such as:
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "%SystemRoot%\Tasks\system32.exe"
With data: "%SystemRoot%\tasks\system32.exe"Last update 20 May 2015