Library
My library

+ Add to library

Profile

Win32.Rmnet.20

Added to the Dr.Web virus database: 2012-05-23

Virus description added:

Technical Information

To ensure autorun and distribution:
Modifies the following registry keys:
  • [<HKLM>\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon] 'Userinit' = '<SYSTEM32>\userinit.exe,,%PROGRAM_FILES%\microsoft\watermark.exe'
Creates the following files on removable media:
  • <Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\uJIxeMUp.cpl
  • <Drive name for removable media>:\autorun.inf
  • <Drive name for removable media>:\RECYCLER\S-3-6-01-5754620102-1334737640-061201044-8252\NhTcjZrg.exe
Malicious functions:
Creates and executes the following:
  • %PROGRAM_FILES%\Microsoft\WaterMark.exe
Executes the following:
  • <SYSTEM32>\svchost.exe
Injects code into
the following system processes:
  • <SYSTEM32>\cscript.exe
a large number of user processes.
Modifies file system :
Creates the following files:
  • <SYSTEM32>\dmlconf.dat
  • %PROGRAM_FILES%\Microsoft\WaterMark.exe
Network activity:
Connects to:
  • 'er#####dthetcwerc.com':443
  • 'rv####eitwjeitv.com':443
  • 'rt######tutnrsbberve.com':443
  • '91.##0.62.30':443
  • '74.##5.232.51':80
UDP:
  • DNS ASK er#####dthetcwerc.com
  • DNS ASK rv####eitwjeitv.com
  • DNS ASK google.com
  • DNS ASK rt######tutnrsbberve.com