Home Malware Programs Worms W32.Gammima.AG

W32.Gammima.AG

Posted: July 4, 2012

Threat Metric

Threat Level: 5/10
Infected PCs: 59
First Seen: July 4, 2012
OS(es) Affected: Windows

W32.Gammima.AG is a spyware-themed worm that distributes itself via removable media (USB thumb drives and similar devices) and steals passwords from popular online games. Recent updates to W32.Gammima.AG have added to its capabilities and made W32.Gammima.AG compatible for attacks against Diablo 3 accounts, and W32.Gammima.AG is capable of running on most versions of Windows. As long as you enact proper precautions when in contact with removable devices and have updated anti-malware software for protection, SpywareRemove.com malware researchers note that successful attacks by W32.Gammima.AG should be minimal to nonexistent. However, unprotected PCs are still in danger of W32.Gammima.AG's attacks, which don't show readily-apparent symptoms for visual detection.

W32.Gammima.AG: Stealing Your Evening's Entertainment without a Trace of Evidence

Because none of W32.Gammima.AG's functions leave behind overt symptoms that affect your PC's behavior or display in obvious ways, you should never try to detect W32.Gammima.AG without any assistance from anti-malware software or PC security professionals. Depending on the software that's used to detect it, W32.Gammima.AG may also be identified by one of its other aliases, which include Worm.Win32.AutoRun.bhx, PWS:Win32/Frethog.V, Trojan-PSW.Win32.OnLineGames.sxa and Trojan-PSW.Win32.OnLineGames.rlh. Lack of symptoms for W32.Gammima.AG also includes a lack of independent memory processes, since W32.Gammima.AG injects its code into normal processes, including the games that W32.Gammima.AG intends to target for account theft, as part of its routine behavior.

Although SpywareRemove.com malware experts have spied recent updates to W32.Gammima.AG that have enabled extra compatibility for stealing account information from Blizzard's hit Diablo 3, W32.Gammima.AG is also capable of stealing passwords and related information from other prominent games, such as:

  • MapleStory
  • Talesweaver
  • ROHAN
  • Seal Online
  • Arad
  • World of Warcraft
  • Kingdom of the Winds
  • Lineage
  • Facebook applications (or 'apps')

Naturally, information that's stolen is promptly sent out to a remote server, presumably for usage in account-hijacking attacks and theft of digital currency or items. SpywareRemove.com malware researchers also note that many of the games noted above also include optional security features that are specifically designed to block attacks like those that are enabled by W32.Gammima.AG, such as additional account authentication measures.

Scrambling to Keep W32.Gammima.AG Off Your Hard Drives

W32.Gammima.AG copies itself to all drives during its installation. Since this includes removable drives, keeping a close eye on USB thumb drives and similar devices is crucial to preventing W32.Gammima.AG from spreading to other PCs. SpywareRemove.com malware researchers recommend that you keep anti-malware software on hand to detect PC threats whenever you use a removable device that's been in contact with another computer.

Although W32.Gammima.AG has been identified since 2007, W32.Gammima.AG has also seen regular updates for enhancing its features. Identifying and removing W32.Gammima.AG should always be done by completely up-to-date anti-malware software, particularly since W32.Gammima.AG creates multiple copies of itself and can include several distinct components.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 117.6 KB (117606 bytes)
MD5: be84a150a7bf01b5c9ac7a537f1391ae
Detection count: 79
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 5, 2012
file.exe File name: file.exe
Size: 249.3 KB (249306 bytes)
MD5: 569274c539a985a35daa195dd2bd6df1
Detection count: 78
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 5, 2012
file.exe File name: file.exe
Size: 139.26 KB (139264 bytes)
MD5: becfa1dc26af3f64973e4a79631dda5d
Detection count: 77
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: July 5, 2012
file.dll File name: file.dll
Size: 31.74 KB (31744 bytes)
MD5: 75eccb98c4f662ed1a77c44016868e87
Detection count: 76
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: July 5, 2012
eeaf9e0f61d3625e42c309836d07a27c.dll File name: eeaf9e0f61d3625e42c309836d07a27c.dll
Size: 31.74 KB (31744 bytes)
MD5: eeaf9e0f61d3625e42c309836d07a27c
Detection count: 75
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
Last Updated: July 5, 2012
%System%\kavo0.dll File name: %System%\kavo0.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%System%\kavo.exe File name: %System%\kavo.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Temp%\[RANDOM FILE NAME].dll File name: %Temp%\[RANDOM FILE NAME].dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
[DRIVE LETTER]:\ntdelect.com File name: [DRIVE LETTER]:\ntdelect.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
[DRIVE LETTER]:\autorun.inf File name: [DRIVE LETTER]:\autorun.inf
Mime Type: unknown/inf
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"kava" = "%System%\kavo.exe"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Pocilies\Explorer\"NoDriveTypeAutoRun" = "0x91"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\"Hidden" = "2"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\"ShowSuperHidden" = "0"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL\"CheckedValue" = "0"

Related Posts

Loading...