Autorun.inf Virus.Win32.AutoRun.ah
his file virus is a Windows PE EXE file. The file is 380 416 bytes in size. It is written in Delphi.
Installation
When launched, the virus copies its executable file as follows:
%System%\config\csrss.exe
%WinDir%\media\arona.exe
It also creates the following file:
%System%\logon.bat
When this file is run, it will launch a copy of the virus:
%System%\config\csrss.exe
In order to ensure that the virus is launched automatically when the system is rebooted, it adds a link to its executable file to the system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Worms" = "%System%\logon.bat"
The virus also creates the following files:
%System%\config\autorun.inf
h:\autorun.inf
f:\autorun.inf
i:\autorun.inf
g:\autorun.inf
k:\autorun.inf
l:\autorun.inf
o:\autorun.inf
j:\autorun.inf
These files will be launched each time the user opens the corresponding hard disk partition using Windows Explorer. When one of these files is run, it will launch a copy of the virus: %System%\config\csrss.exe.
Payload
The virus modifies values of the following system registry keys: It also searches the hard disk partitions listed below for files with an ".mp3" extension: These files wil then be deleted.[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
DisableTaskMgr = 1
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
NoFolderOptions = 1d:\
c:\
e:\
f:\
g:\
h:\Removal instructions
Manager to terminate the virus process.
the program originally penetrated the victim machine).
What
is a system registry and how do I use it for details on how to edit the registry):[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
DisableTaskMgr = 1
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
NoFolderOptions = 1
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Worms" = "%System%\logon.bat"%System%\config\csrss.exe
%WinDir%\media\arona.exe
%System%\logon.bat
%System%\config\autorun.inf
h:\autorun.inf
f:\autorun.inf
i:\autorun.inf
g:\autorun.inf
k:\autorun.inf
l:\autorun.inf
o:\autorun.inf
j:\autorun.inf
computer (download a trial version of Kaspersky Anti-Virus).
Or
To find and delete malicious files using the Windows Find or Search utility
Follow the instructions for your operating system:
Windows 95/98/Me/NT/2000
Click Start, point to Find or Search, and then click Files or Folders.
Make sure that "Look in" is set to (C:) and that "Include subfolders" is checked.
In the "Named" or "Search for..." box, type, or copy and paste, the file name, autorun.inf.
Click Find Now or Search Now.
Delete any files called autorun.inf that are located in the root folder.
Note: The only 'autorun.inf' that needs to be deleted is located in the
root folder, which is c:\, d:\, and so on. Any 'autorun.inf' files
found in subfolders do not need to be deleted.
Windows XP
Click Start > Search.
Click All files and folders.
In the "All or part of the file name" box, type, or copy and paste, the file name autorun.inf.
Verify that "Look in" is set to "Local Hard Drives" or to (C:).
Click More advanced options.
Check Search system folders.
Check Search subfolders.
Click Search.
Delete any files called autorun.inf that are located in the root folder.
Note: The only 'autorun.inf' that needs to be deleted is located in the
root folder, which is c:\, d:\, and so on. Any 'autorun.inf' files
found in subdirectories do not need to be deleted.
estart in safe mode(scan with virus scanner and spyware scan,
may need to turn off system restore...
also run regedit and check whats in run folder
HKEY_LOCAL_MACHINE\SOFTWARE\
Microsoft\Windows\
CurrentVersion\Run
disable/delete unknowns if any,
empty temp folder
delete old caches files
figure out where you got it from, to find better answers...
W32/RJump.worm
W32/RJump.worm has been deemed Low-Profiled due to media attention at http://www.betanews.com/article/Apple_Ships_iPods_with_Windows_Virus/1161112089
W32/Rjump.worm is a worm written using the Python scripting language and was converted into a windows portable executable file using the Py2Exe tool. It attempts to spread by coping itself to mapped and removable storage drives and also opens a backdoor on an infected system.
Aliases
- Backdoor.Rajump (Symantec)
- W32/Jisx.A.worm (Panda)
- W32/RJump-C (Sophos)
- W32/RJump.A!worm (Fortinet)
- Win32/RJump.A (ESET)
- Win32/RJump.A!Worm (CA)
- Worm.RJump.A (BitDefender)
- Worm.Win32.RJump.a (Kaspersky)
- Worm/Rjump.E (Avira)
- WORM_SIWEOL.B (TrendMicro)
Characteristics
Characteristics -
-- Update October 17, 2006 --
W32/RJump.worm has been deemed Low-Profiled due to media attention at http://www.betanews.com/article/Apple_Ships_iPods_with_Windows_Virus/1161112089
Upon execution, it creates a copy of itself into the windows system directory:
- %Windir%\RAVMON.EXE
Also create a non-malicious "RavMonLog" file that contains the port number on which its backdoor component listens.
Adds the following values to the registry to auto start itself when Windows starts.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
"RavAV" = "%Windir%\RAVMON.EXE"
Symptoms
Symptoms -
W32/Rjump.worm creates a port exception for its backdoor component to bypass the built-in firewall of WinXp by executing the following netsh command.
%Windir%\%Sysdir%\cmd.exe /c netsh firewall add portopening TCP 16942 NortonAV
Note: The backdoor port opened is randomly chosen.
Posts ip address and backdoor port information from an infected machine back to the virus author via the following URL:
- http://natrocket.9966.[Removed]:5288/iesocks?peer_id=%s&port=%s&type=%s&ver=4sD
Method of Infection
Method of Infection -
W32/Rjump.worm lists all mapped and removable storage drives on an infected system and drops the following files onto the root folder of the available drive:
- autorun.inf --> used to autorun the worm when the drive is accessed
- msvcr71.dll --> Clean Microsoft Visual Studio dll file
- ravmon.exe --> copy of the worm
The contents of the autorun.inf are as follows:
[AutoRun]
open=RavMonE.exe e
shellexecute=RavMonE.exe e
shell\Auto\command=RavMonE.exe e
shell=Auto
Infection occurs when a removable storage device or a mapped drive hosting a copy of W32/Rjump.worm is accessed and the user agrees to the auto run prompt for execution of the worm.
Removal -
Removal -
A combination of the latest DATs and the Engine will be able to detect and remove this threat. AVERT recommends users not to trust seemingly familiar or safe file icons, particularly when received via P2P clients, IRC, email or other media where users can share files.
Additional Windows ME/XP removal considerations
Stinger:
A Stinger Standalone removal tool has been released to assist in repairing this threat.
Variants
Variants -
N/A
0 Comments:
Post a Comment
<< Home