Home / malwarePDF  

Worm:Win32/Tupym.A


First posted on 15 February 2019.
Source: Microsoft

Aliases :

Worm:Win32/Tupym.A is also known as W32/Tupym.worm, WORM_SOHANAD.SM, Worm.Win32.AutoRun.fnc, W32/AutoRun-AOA, W32.Imaut.

Explanation :

Installation

When executed, Win32/Tupym copies itself to your computer as the following:

%windir%system3_.exe system3_.exe

It makes changes to the system registry so that it automatically runs every time you start your computer:

In subkey: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun
Sets value: "Yahoo Messengger"
With data: "system3_.exe"

In subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon
Sets value: "Shell"
With data: "explorer.exe system3_.exe"

It also tries to create a scheduled Windows task that runs the worm at 09:00 every day of the week, by running the following Windows shell command:

cmd.exe /C AT /delete /yes
cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su system3_.exe

It also creates the following file in your computer:

autorun.ini - detected as Win32/Tupym.A!inf Payload

Contacts remote hosts

Win32/Tupym may contact the following remote hosts using port 80:

h1.ripway.com www.balu000.0catch.com www.balu001.0catch.com www.balu002.0catch.com www.balu003.0catch.com www.balu004.0catch.com www.balu005.0catch.com www.balu006.0catch.com www.balu007.0catch.com

Commonly, malware may contact a remote host for the following purposes:

To confirm Internet connectivity To report a new infection to its author To receive configuration or other data To download and execute arbitrary files (including updates or additional malware) To receive instruction from a remote attacker To upload data taken from the affected computer

Analysis by Scott Molenkamp

Last update 15 February 2019

 

TOP