WORM_STECKCT.EVL
Posted: May 18, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
| Threat Level: | 2/10 |
|---|---|
| Infected PCs: | 52 |
| First Seen: | May 18, 2012 |
|---|---|
| OS(es) Affected: | Windows |
WORM_STECKCT.EVL is a worm that distributes itself via social networks and instant messaging programs, including Facebook and AIM. Any WORM_STECKCT.EVL infection should be seen as a high-level threat to your computer's safety, since WORM_STECKCT.EVL not only disables but actually deletes files that are related to popular anti-malware programs. The rest of WORM_STECKCT.EVL's payload consists of installing a second worm, propagating itself in the above fashion with your computer's resources and creating a backdoor exploit that criminals could use to control your PC. According to WORM_STECKCT.EVL's nature as a PC threat, SpywareRemove.com malware researchers recommend that you try to disable WORM_STECKCT.EVL and re-download appropriate anti-malware software, or use anti-malware products to delete WORM_STECKCT.EVL that aren't within WORM_STECKCT.EVL's list of defined targets for deletion (as noted later in this article).
WORM_STECKCT.EVL: Even for Worms, a Pretty Fair Definition of Evil
As is the case with all worms, WORM_STECKCT.EVL specializes in propagating itself widely through various exploits, but what SpywareRemove.com malware researchers have found to make WORM_STECKCT.EVL relatively unique is its level of hostility to anti-virus scanners and related security programs. In addition to stopping the memory processes for such applications, WORM_STECKCT.EVL will actively delete their files from your computer, necessitating that you re-download them if you want your anti-virus software to work again! The full list of files that WORM_STECKCT.EVL targets can be seen below for reference, although WORM_STECKCT.EVL (thankfully) doesn't include all brands of anti-malware software:
- AntiVirService
- avgnt.exe
- AviraUpgradeService
- avp
- avp.exe
- egui.exe
- ekrn
- ekrn.exe
- kavsvc.exe
- MSASCui.exe
- MsMpEng.exe
- MsMpSvc
- msseces.exe
- WinDefend
- wuauserv
- YahooAUService
- YahooAUService.exe
Detecting and removing WORM_STECKCT.EVL with any type of functional anti-malware product should, obviously, be considered an urgent priority, since WORM_STECKCT.EVL induces a prolonged state of poor security for the infected PC. As the cream on top of this unsavory cake, WORM_STECKCT.EVL will also contact a remote server to receive instructions and allow criminals to access your computer – a type of hostile behavior that's standard for backdoor Trojan-based PC threats. SpywareRemove.com malware researchers recommend that you scan your entire HD while trying to remove WORM_STECKCT.EVL, since WORM_STECKCT.EVL has also been found to install a second worm (identified as WORM_EBOOM.AC) that injects its code into native memory processes by default.
How a Worm So Wicked Gets Around
WORM_STECKCT.EVL and its fellow worm both handle their own distribution via social network websites and popular IM programs, including Facebook, AIM, ICQ, Yahoo Messenger and Google Talk. Private messages for Facebook et al launched by WORM_STECKCT.EVL and WORM_EBOOM.AC contain hyperlinks with names such as 'May09-Picture18.JPG_www.facebook.com.zip.' Although the archive file is a real .zip file, it also contains WORM_STECKCT.EVL, which proceeds to drop its payload after you open the .zip in hopes of seeing an interesting picture. The link may also be shortened to obfuscate its real origins.
Accordingly, the best way to protect your PC from WORM_STECKCT.EVL is to avoid suspicious links from the above sources, even if they appear to have been sent by a friend – chances are good that WORM_STECKCT.EVL has merely infected your acquaintance's computer and hijacked their account for its own purposes.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:%Windows%\iqs.exe
File name: %Windows%\iqs.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Registry Modifications
HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List %Windows%\iqs.exe = "%Windows%\iqs.exe:*:Enabled:MSN Messenger"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List %Windows%\iqs.exe = "%Windows%\iqs.exe:*:Enabled:Microsoft Firevall Engine"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.