Home / malwarePDF  

Worm:Win32/Pochi.A


First posted on 10 March 2019.
Source: Microsoft

Aliases :

Worm:Win32/Pochi.A is also known as Trojan.Win32.Scar.ajze, Trojan.Scar!dQ4lDa5J0us, Trojan.Win32.Scar, Trj/Scar.N, TROJ_SCAR.AD.

Explanation :

Worm:Win32/Pochi.A is a worm that spreads via logical drives. It also changes computer settings to hide known file extensions. Installation Worm:Win32/Pochi.A drops the following copies of itself in the root folder (usually C:):   ntdetect.exe windows.exe   It drops the legitimate DLL file "msvbvm60.dll" as "klampokchild.616" in the Windows system folder.     Worm:Win32/Pochi.A modifies the following registry entries to ensure that its copy executes at each Windows start:   In subkey: HKLMSoftwareMicrosoftWindowsCurrentVersionRun Sets value: "AVG" With data: "C:windows.exe" Spreads via... Logical drives Worm:Win32/Pochi.A spreads to mapped drives by enumerating all drives from C: to Z:. If a drive is found, it copies itself to the root of the drive as "subst.exe". Payload Modifies computer settings Worm:Win32/Pochi.A hides known file extensions when files are viewed in Windows Explorer by setting the following registry entry:   In subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced Sets value: "HideFileExt" With data: "1"   Analysis by Marianne Mallen

Last update 10 March 2019

 

TOP