Home / malwarePDF  

P2P-Worm:W32/Bacteraloh.H


First posted on 26 February 2009.
Source: SecurityHome

Aliases :

There are no other names known for P2P-Worm:W32/Bacteraloh.H.

Explanation :

The detection P2P-Worm.Win32.Bacteraloh.H refers to files that have been infected by Virus.Win32.Sality.S.

right]While active, Sality.S terminates running processes with names associated with common antivirus programs.

Infection

Sality.S is an appending, polymorphic file infector that uses an entry point obscuring technique. During infection, it replaces 129 bytes from the beginning of the host file's code with its decryption routine, then hides the replaced code in its own code. The virus's own code is encrypted and appended to the host file as a new section, with a random name and a size of 28672 bytes.

A detailed description of Sality's method of operation is available in the description of Virus.Win32.Sality.Q.

Installation

During installation, Sality.S creates the following files:

  • %windir%system32wmdrtc32.dl_ - Archived copy of wmdrtc32.dll
  • %windir%system32wmdrtc32.dll - Detected as Virus.Win32.Sality.S
  • %windir%system32driversekkkjn.sys - Detected as Virus.Win32.Sality.S

It modifies the file %windir%system.ini by adding the following:

  • [MCIDRV_VER]
    DEVICE=

In addition, the following is loaded into all processes

  • %windir%system32wmdrtc32.dll

Registry

Sality.S deletes a large number of registry keys, a small sample of which is listed in this description.

Last update 26 February 2009

 

TOP