Home / malware PWS:Win32/Nemqe.B
First posted on 16 February 2010.
Source: SecurityHomeAliases :
PWS:Win32/Nemqe.B is also known as Trojan.PWS.Nemqe.SS (VirusBuster), TR/PSW.Nemqe.B.7 (Avira), Win32/PSW.Pebox.CA (ESET), PWS.y!bur (McAfee), TROJ_NEMQE.SMN (Trend Micro).
Explanation :
PWS:Win32/Nemqe.B is a detection for the DLL component of a game password stealer.
Top
PWS:Win32/Nemqe.B is a detection for the DLL component of a game password stealer. InstallationPWS:Win32/Nemqe.B usually arrives as a component file of other malware such as other PWS:Win32/Nemqe variants or PWS:Win32/Pebox.A. It is installed in the Windows Systems folder with a random file name. Some of the file names it has been known to use are the following:Kance.dll yxjansf.dll lpk.dll Payload Loads other filesPWS:Win32/Nemqe.B queries for the data of the following registry entry: Entry: "Ins"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon For example:
Entry: "Ins"
With data: "nativeproc.dll,"
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon It then loads the DLL file specified in the data field in the registry. The DLL file associated with this registry entry is usually a member of the PWS:Win32/Nemqe or PWS:Win32/Pebox family. Both families are known for stealing information related to online games such as user names, passwords, levels, gold, or money.
Analysis by Elda DimakilingLast update 16 February 2010