Home / malware Virus:Win32/Expiro.BC
First posted on 07 February 2013.
Source: MicrosoftAliases :
Virus:Win32/Expiro.BC is also known as Win32/Expiro4.Gen (AhnLab), Virus found Win32/Expiro (AVG), Win32/Expiro.NAN virus (ESET), W32/Expiro.gen.n (McAfee), Win32.Expiro.V (Rising AV), W32.Xpiro.D (Symantec).
Explanation :
Spreads via...
File infection
Virus:Win32/Expiro.BC searches for and infects EXE files from drives C: to Z:. It infects files by appending its virus code as a section named ".vmp0" to the target file.
It may create a copy of the infected file using the same file name but with the extension VIR. For example, if this virus infects a file named "foo.exe", it may create an infected copy as "foo.vir", which is deleted after some time.
If this virus targets a protected file, it disables Windows File Protection to infect the file.
Payload
Steals sensitive information
Virus:Win32/Expiro.BC may collect the following sensitive information about your computer:
- Installed certificates
- Credentials stored by FileZilla
- Credentials stored by Windows Protected Storage
- Credentials stored by users, for example, in Internet Explorer
It logs the stolen credentials in the following clean files:
- %LOCALAPPDATA%\wsr<number>zt32.dll, for example, wsr27zt32.dll
- %APPDATA%\<volume serial of the Windows system folder><number>.nls, for example, fcjejege27.nls
Modifies Internet Explorer settings
Virus:Win32/Expiro.BC lowers your Internet Explorer security by changing the following settings:
In subkeys:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
Allows content of mixed security to display across all zones:
Sets value:"1609"
With data: "0"
Allows status bar updates via scripts:
Sets value: "2103"
With data: "0"
Accesses data sources across domains:
Sets value: "1406" With data: "0"
Additional information
Virus:Win32/Expiro.BC creates mutexes to ensure that only one instance of itself is running. The mutex may include one or more of the following formats:
- kkq-vx_mtx<number>
- gazavat-svc
- gazavat-svc_<number>
For example, kkq-vx_mtx1 or gazavat-svc_27.
Analysis by Rex Plantado
Last update 07 February 2013