Home Malware Programs Worms WORM_STECKCT.EVL

WORM_STECKCT.EVL

Posted: May 18, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 52
First Seen: May 18, 2012
OS(es) Affected: Windows

WORM_STECKCT.EVL is a worm that distributes itself via social networks and instant messaging programs, including Facebook and AIM. Any WORM_STECKCT.EVL infection should be seen as a high-level threat to your computer's safety, since WORM_STECKCT.EVL not only disables but actually deletes files that are related to popular anti-malware programs. The rest of WORM_STECKCT.EVL's payload consists of installing a second worm, propagating itself in the above fashion with your computer's resources and creating a backdoor exploit that criminals could use to control your PC. According to WORM_STECKCT.EVL's nature as a PC threat, SpywareRemove.com malware researchers recommend that you try to disable WORM_STECKCT.EVL and re-download appropriate anti-malware software, or use anti-malware products to delete WORM_STECKCT.EVL that aren't within WORM_STECKCT.EVL's list of defined targets for deletion (as noted later in this article).

WORM_STECKCT.EVL: Even for Worms, a Pretty Fair Definition of Evil

As is the case with all worms, WORM_STECKCT.EVL specializes in propagating itself widely through various exploits, but what SpywareRemove.com malware researchers have found to make WORM_STECKCT.EVL relatively unique is its level of hostility to anti-virus scanners and related security programs. In addition to stopping the memory processes for such applications, WORM_STECKCT.EVL will actively delete their files from your computer, necessitating that you re-download them if you want your anti-virus software to work again! The full list of files that WORM_STECKCT.EVL targets can be seen below for reference, although WORM_STECKCT.EVL (thankfully) doesn't include all brands of anti-malware software:

  • AntiVirService
  • avgnt.exe
  • AviraUpgradeService
  • avp
  • avp.exe
  • egui.exe
  • ekrn
  • ekrn.exe
  • kavsvc.exe
  • MSASCui.exe
  • MsMpEng.exe
  • MsMpSvc
  • msseces.exe
  • WinDefend
  • wuauserv
  • YahooAUService
  • YahooAUService.exe

Detecting and removing WORM_STECKCT.EVL with any type of functional anti-malware product should, obviously, be considered an urgent priority, since WORM_STECKCT.EVL induces a prolonged state of poor security for the infected PC. As the cream on top of this unsavory cake, WORM_STECKCT.EVL will also contact a remote server to receive instructions and allow criminals to access your computer – a type of hostile behavior that's standard for backdoor Trojan-based PC threats. SpywareRemove.com malware researchers recommend that you scan your entire HD while trying to remove WORM_STECKCT.EVL, since WORM_STECKCT.EVL has also been found to install a second worm (identified as WORM_EBOOM.AC) that injects its code into native memory processes by default.

How a Worm So Wicked Gets Around

WORM_STECKCT.EVL and its fellow worm both handle their own distribution via social network websites and popular IM programs, including Facebook, AIM, ICQ, Yahoo Messenger and Google Talk. Private messages for Facebook et al launched by WORM_STECKCT.EVL and WORM_EBOOM.AC contain hyperlinks with names such as 'May09-Picture18.JPG_www.facebook.com.zip.' Although the archive file is a real .zip file, it also contains WORM_STECKCT.EVL, which proceeds to drop its payload after you open the .zip in hopes of seeing an interesting picture. The link may also be shortened to obfuscate its real origins.

Accordingly, the best way to protect your PC from WORM_STECKCT.EVL is to avoid suspicious links from the above sources, even if they appear to have been sent by a friend – chances are good that WORM_STECKCT.EVL has merely infected your acquaintance's computer and hijacked their account for its own purposes.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%Windows%\iqs.exe File name: %Windows%\iqs.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List %Windows%\iqs.exe = "%Windows%\iqs.exe:*:Enabled:MSN Messenger"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List %Windows%\iqs.exe = "%Windows%\iqs.exe:*:Enabled:Microsoft Firevall Engine"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Firevall Engine = "%Windows%\iqs.exe"
Loading...