Home / malware Worm:Win32/Puccmine.A
First posted on 01 October 2014.
Source: MicrosoftAliases :
There are no other names known for Worm:Win32/Puccmine.A.
Explanation :
Threat behavior
Installation
Worm:Win32/Puccmine.A copies itself to c:\documents and settings\administrator\\ .exe. The malware creates files on your PC using variable file names, for example:
The malware creates the following files on your PC:
- c:\documents and settings\administrator\local settings\temp\8s3q3yfc.bat - detected as Worm:BAT/Puccmine.A
- c:\documents and settings\administrator\local settings\temp\8sd7pe5s.bat - detected as Worm:BAT/Puccmine.A
- c:\documents and settings\administrator\local settings\application data\qb07004c.bb\libcurl.dll
- c:\documents and settings\administrator\local settings\application data\qb07004c.bb\minerd.exe
- c:\documents and settings\administrator\local settings\application data\qb07004c.bb\pthreadgc2.dll
- c:\documents and settings\administrator\local settings\application data\qb07004c.bb\zlib1.dll
- c:\documents and settings\administrator\local settings\application data\qb0743ae.43\libcurl.dll
- c:\documents and settings\administrator\local settings\application data\qb0743ae.43\minerd.exe
- c:\documents and settings\administrator\local settings\application data\qb0743ae.43\pthreadgc2.dll
- c:\documents and settings\administrator\local settings\application data\qb0743ae.43\zlib1.dll
Payload
Contacts remote host
Worm:Win32/Puccmine.A might contact a remote host at mine.pool-x.eu using port 9000. Commonly, malware does this to:This malware description was produced and published using automated analysis of file SHA1 4d9060d08d38347b99065807bfdfd63d5d3259b0.Symptoms
- Report a new infection to its author
- Receive configuration or other data
- Download and run files, including updates or other malware
- Receive instructions from a remote hacker
- Upload data taken from your PC
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\local settings\application data\qb07004c.bb\libcurl.dll
c:\documents and settings\administrator\local settings\application data\qb07004c.bb\minerd.exe
c:\documents and settings\administrator\local settings\application data\qb07004c.bb\pthreadgc2.dll
c:\documents and settings\administrator\local settings\application data\qb07004c.bb\zlib1.dll
c:\documents and settings\administrator\local settings\application data\qb0743ae.43\libcurl.dll
c:\documents and settings\administrator\local settings\application data\qb0743ae.43\minerd.exe
c:\documents and settings\administrator\local settings\application data\qb0743ae.43\pthreadgc2.dll
c:\documents and settings\administrator\local settings\application data\qb0743ae.43\zlib1.dll
c:\documents and settings\administrator\local settings\temp\8s3q3yfc.bat
c:\documents and settings\administrator\local settings\temp\8sd7pe5s.batLast update 01 October 2014