SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Psyokym.A_3
Psyokym.A_3 is a Worm. Worms are reproducing malicious programs that run independently and travel across network connections without human action. They could spread over email, IM, peer-to-peer networks, or directly over the wire by leveraging vulnerabilities. The threat that a worm poses is its capability to replicate itself on the system so the computer can send out hundreds or thousands of copies of itself.

File Related Changes
It drops the following file(s) on the system:
  • "C:\Documents and Settings\All Users\Application Data\Admin.exe"
  • "\Documents and Settings\All Users\Application Data\Admin.exe"
  • "C:\Documents and Settings\All Users\Application Data\habeys.exe"

Process Related Changes
It creates the following mutex(es):
  • ZonesLockedCacheCounterMutex"
  • c:!documents and settings!admin!local settings!history!history.ie5!"
  • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"
  • ZoneAttributeCacheCounterMutex"
  • ZonesCacheCounterMutex"
  • WininetConnectionMutex"
  • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • ZonesCounterMutex"
  • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • c:!documents and settings!admin!cookies!"

It creates the following process(es):
  • C:\WINDOWS\system32\ntvdm.exe
  • C:\WINDOWS\Temp\4f297ee658ae0136b16af68457946232.exe [ \c:\windows\temp\4f297ee658ae0136b16af68457946232.exe ]

Network Activity
We observed the following DNS query/queries:
  • www.hoarafushionline.net
  • xsso.www.hoarafushionline.net
  • sso.anbtr.com

It attempts to connect to the following remote servers:
  • 127.xxxxxx:1029


Relevant Information