Home / malwarePDF  

Win32.Virtob.Gen


First posted on 21 November 2011.
Source: BitDefender

Aliases :

There are no other names known for Win32.Virtob.Gen.

Explanation :

The virus is written in assembly language.
It infects *.exe and *.scr files when files are opened (the usage of tools that show file icons is very harmful in this situation). When infecting the virus appends itself at the end of the file as a crypted body. It does not infect dll files or file whose name start with (“winc”,”wcun”,”wc32”,”psto”). It hides its process by injecting viral code in other processes in the system.



The virus is continuously trying to connect to a IRC (proxima.irc[removed]) server on port 65520 and receives commands to download a file. It can interpret 2 different commands:

a "check if connected" command a PRIV command witch can contain a link to a possible virus.

The default file witch is being downloaded from the IRC server is VT100.exe (witch moves itself in %windir%/system32 directory and acts as a backdoor program).

Last update 21 November 2011

 

TOP

Malware :