Home / malwarePDF  

Virus:W32/Alman.B


First posted on 11 June 2007.
Source: SecurityHome

Aliases :

Virus:W32/Alman.B is also known as Virus.Win32.Alman.b.

Explanation :

This network propagating virus infects all executable files in the system. It also has rootkit capabilities.

After the infected file is started the virus decrypts its body and drops 2 files:


The DLL is the main virus component. The SYS file is a rootkit component that hides certain files and Registry keys.

The dropped DLL file is injected into Windows Explorer process and runs with system priviledges.

To spread in a network the virus tries to connect to the IPC$ share with login 'Administrator' and performs a dictionary attack on admin password using these values:


If connection is successful, the virus copies itself as 'Setup.exe' file to the root of a system drive and starts the copied file as a service.

The virus infects EXE files that are not protected by Windows System File Check on local, removable and remote drives. The virus does not infect file with those names:


The virus also doesn't infect files located in the following folders:


The virus terminates the following processes:


If the files that belong to terminated processes located in specific folders, they are deleted.

Last update 11 June 2007

 

TOP

Malware :

Family: