Sonicwall Signatures


Go to All Categories list.

Virut.ACL is a polymorphic file infector virus that target Microsoft Windows operating systems. It is known to infect files with .exe and .scr extensions on local drives, removable media, and network shares.

      Process Related Changes
      It creates the following mutex(es):
      • c:!documents and settings!admin!cookies!"
      • c:!documents and settings!admin!local settings!history!history.ie5!"
      • c:!documents and settings!admin!local settings!temporary internet files!content.ie5!"

      It creates the following process(es):
      • C:\WINDOWS\Temp\34777a3dfd632c7f23e086789e6ac05e.exe [ \c:\windows\temp\34777a3dfd632c7f23e086789e6ac05e.exe ]

      It injects malicious code into the following process(es):
      • "C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe"
      • "C:\WINDOWS\system32\svchost.exe"
      • "C:\WINDOWS\system32\tlntsrv.exe"
      • "C:\WINDOWS\system32\winlogon.exe"
      • "C:\WINDOWS\system32\rundll32.exe"
      • "C:\WINDOWS\system32\ctfmon.exe"
      • "C:\WINDOWS\system32\wbem\wmiprvse.exe"
      • "C:\WINDOWS\explorer.exe"
      • "C:\WINDOWS\system32\services.exe"
      • "C:\WINDOWS\system32\alg.exe"
      • "C:\WINDOWS\system32\lsass.exe"
      • "C:\Program Files\Java\jre6\bin\jqs.exe"
      • "C:\WINDOWS\system32\spoolsv.exe"

      Network Activity
      We observed the following DNS query/queries:

      It attempts to connect to the following remote servers:
      • 148.81.xxxxxx:80

      Registry Related Changes
      It makes the following registry modifications to ensure infection after system reboot:
      • HKLM\system\CurrentControlSet\Services\= g
      • HKLM\system\CurrentControlSet\Services\sharedaccess\epoch\= g

      Relevant Information