Malware Undetected By Bitdefender[solved]

Attached zip file zz.zip;


encrypted with password:


infected


Threat normally identified by McAfee ViruScan as pws-legmir.gen.k and pws-legmir.gen.k.dll.


ThreatExpert report:


http://www.threatexpert.com/report.aspx?ui...a4-384227ac7ad9


Submission Summary:


* Submission details:


o Submission received: 24 April 2008, 06:22:58


o Processing time: 4 min 13 sec


o Submitted sample:


+ File MD5: 0x67818D263FE0F8C2FDF42F1722AFD068


+ Filesize: 140.548 bytes


* Summary of the findings:


What's been found Severity Level


Downloads/requests other files from Internet.


Modifies some system settings that may have negative impact on overall system security state.


Creates a startup registry entry.


Contains characteristics of an identified security risk.


Technical Details:


Possible Security Risk


* Attention! Characteristics of the following security risk was identified in the system:


Security Risk Description


Rootkit.Agent.QV Rootkit.Agent.QV injects rootkit components into Windows processes and attempts to hides itself from detection. It also made changes to Windows Explorer settings and download other malicious files from external servers.


File System Modifications


* The following files were created in the system:


# Filename(s) File Size File MD5 Alias


1 c:.com 116.871 bytes 0x319443231C6B8B2945839353211323DA (not available)


2 c:\autorun.inf 544 bytes 0xFEE13D7B72CFD52FE0718A25FD36FF80 (not available)


3 %Temp%\eytsuap7.dll 26.388 bytes 0xABF0801BF467D979683AE104E3A77A80 Trojan.Onlinegames.Gen!Pac.73 [PCTools]Bloodhound.Packed.Jmp [symantec]


4 %Temp%\tru1.tmp 140.548 bytes 0x67818D263FE0F8C2FDF42F1722AFD068 (not available)


5 %System%\kavo.exe 116.871 bytes 0xA4DEAFAC4C9010E0655597C3C0BDB2B7 W32/Autorun.worm.bx.gen [McAfee]


6 %System%\kavo1.dll 125.952 bytes 0x9A88F77584DB91C027D8DAE0D9B92842 PWS-LegMir.gen.k.dll [McAfee]


* Notes:


o %Temp% is a variable that refers to the temporary folder in the short path form. By default, this is C:\Documents and Settings\[userName]\Local Settings\Temp\ (Windows NT/2000/XP).


o %System% is a variable that refers to the System folder. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).


Memory Modifications


* There were new processes created in the system:


Process Name Process Filename Main Module Size


1.exe %Windir%\1.exe 262.144 bytes


[filename of the sample #1] [file and pathname of the sample #1] 147.456 bytes


kavo.exe %System%\kavo.exe 262.144 bytes


* There was a new memory page created in the address space of the system process(es):


Process Name Process Filename Allocated Size


explorer.exe %Windir%\explorer.exe 131.072 bytes


* The following module was loaded into the address space of other process(es):


Module Name Module Filename Address Space Details


kavo1.dll %System%\kavo1.dll Process name: explorer.exe


Process filename: %Windir%\explorer.exe


Address space: 0x1970000 - 0x19A3000


Registry Modifications


* The newly created Registry Value is:


o [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]


+ kava = "%System%\kavo.exe"


so that kavo.exe runs every time Windows starts


* The following Registry Value was modified:


o [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL]


+ CheckedValue = 0x00000000


so that hidden files and folders are not displayed in explorer when browsing the file system


Other details


* Analysis of the file resources indicate the following possible country of origin:


China


* The following Internet download was started (the retrieved bits are saved into the local file):


URL to be downloaded Filename for the downloaded bits


http://www.1a123.com/hp/zz.rar %Temp%\zz.rar

/applications/core/interface/file/attachment.php?id=1912" data-fileid="1912" rel="">zz.zip

Comments