Home / malwarePDF  

Trojan:Win32/Killav.GO


First posted on 26 June 2012.
Source: Microsoft

Aliases :

There are no other names known for Trojan:Win32/Killav.GO.

Explanation :



Trojan:Win32/Killav.GO is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer. Installation When executed, Trojan:Win32/Killav.GO copies itself to %windir%\flashplayer12.exe. The malware modifies the following registry entries to ensure that its copy executes at each Windows start:

Adds value: "FlashPlayer12 Update"
With data: "c:\windows\flashplayer12.exe"
To subkey: HKCU\Software\Microsoft\windows\currentversion\run The malware creates the following files on an affected computer:

  • %windir%\kbr9098798799.log
  • %windir%\twain.dll.exe - detected as Trojan:Win32/Killav.GO
  • c:\documents and settings\administrator\local settings\temp\7.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\8.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\9.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\a.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\b.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\c.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\d.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\e.tmp\basebat.bat
  • c:\documents and settings\administrator\local settings\temp\f.tmp\basebat.bat
Payload Modifies system security settings Trojan:Win32/Killav.GO modifies the affected computer system's security settings by making the following changes to the registry:

    • The malware may attempt to disable Firewall notifications from the Windows Security Center by making the following registry modification:

      Adds value: "FirewallDisableNotify"
      With data: "1"
      To subkey: HKLM\SOFTWARE\Microsoft\Security Center
    • The malware may attempt to disable antivirus notifications from the Windows Security Center by making the following registry modification:

      Adds value: "AntiVirusDisableNotify"
      With data: "1"
      To subkey: HKLM\SOFTWARE\Microsoft\Security Center
    • The malware may attempt to stop the Windows Security Center from displaying automatic update alerts by making the following registry modification:

      Adds value: "UpdatesDisableNotify"
      With data: "1"
      To subkey: HKLM\SOFTWARE\Microsoft\Security Center
Modifies browser settings The malware modifies web browser settings on the infected computer by making the following registry modification:

Adds value: "AutoConfigURL"
With data: ""
To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Contacts remote hostThe malware may contact a remote host at 50.97.3.104 using port 80. Commonly, malware may contact a remote host for the following purposes:
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer

This malware description was produced and published using our automated analysis system's examination of file SHA1 45a2de9437987eb288fcee723b88e0a43d2bd0e3.

Last update 26 June 2012

 

TOP