Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'RapidSlaught' = '%APPDATA%\MyFolder\RapidSlaught.exe'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'Microsoft © operating system' = '%HOMEPATH%\srrmfc.exe'
- [<HKCU>\Software\Microsoft\Windows NT\CurrentVersion\Windows] 'load' = '%HOMEPATH%\srrmfc.exe'
- <SYSTEM32>\wscript.exe "%APPDATA%\MyFolder\tmp3.vbs" 0
- %APPDATA%\MyFolder\tmp3.vbs
- %APPDATA%\MyFolder\RapidSlaught.ram
- %APPDATA%\MyFolder\tmp3.vbs
- from <Full path to virus> to %HOMEPATH%\srrmfc.exe
- 'in#####a-irc.no-ip.info':3301
- 'ap#.##pmania.com':80
- 'wp#d':80
- ap#.##pmania.com/
- wp#d/wpad.dat
- DNS ASK in#####a-irc.no-ip.info
- DNS ASK ap#.##pmania.com
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: ''