Home Malware Programs Worms Worm:Win32/Brontok.AS@mm

Worm:Win32/Brontok.AS@mm

Posted: January 14, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 96
First Seen: August 27, 2012
Last Seen: July 7, 2020
OS(es) Affected: Windows

Worm:Win32/Brontok.AS@mm is a mass-mailing email worm that changes certain computer settings, such as display of hidden files. Worm:Win32/Brontok.AS@mm also disables registry editing. Worm:Win32/Brontok.AS@mm circulates by sending a copy of itself, as an email attachment, to contacts existing on your computer. Worm:Win32/Brontok.AS@mm is also able to copy itself to USB, removable drives and shared folders. When installed on the compromised PC, Worm:Win32/Brontok.AS@mm makes system changes by dropping numerous potentially malicious files and making registry modifications. While being run, Worm:Win32/Brontok.AS@mm opens a Windows Explorer window to the "My Documents" folder. Worm:Win32/Brontok.AS@mm uses the Windows "new folder" icon for its copies. This may cause the file to occur as if it were a new folder rather than an executable file, attracting PC users into accidentally running Worm:Win32/Brontok.AS@mm. Worm:Win32/Brontok.AS@mm modifies the registry entries to assure that its copy runs automatically every time you start Windows.

Aliases

Win32/Brontok.worm.42579 [AhnLab-V3]Heuristic.BehavesLike.Win32.Suspicious-BAY.K [McAfee-GW-Edition]Worm/Brontok.QA [AntiVir]Worm.Win32.Brontok.CV [Comodo]W32/Brontok.CM@mm [F-Prot]W32/Brontok.N@mm [Fortinet]Win32/Brontok.worm.45568.E [AhnLab-V3]Win32/Robknot.CA [eTrust-Vet]Heuristic.LooksLike.Win32.Suspicious.F [McAfee-GW-Edition]TR/Crypt.CFI.Gen [AntiVir]Worm.Win32.Brontok.CS [Comodo]W32/Brontok-N [Sophos]Backdoor.Generic.199005 [BitDefender]Worm.Brontok.AI [ClamAV]Win32:Brontok-CE [Avast]
More aliases (71)

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\autoexec.bat File name: C:\autoexec.bat
File type: Batch file
Mime Type: unknown/bat
Group: Malware file
%APPDATA%\bronnpath0.txt File name: %APPDATA%\bronnpath0.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\bronfoldnetdomlist.txt File name: %APPDATA%\bronfoldnetdomlist.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\bronnetdomlist.bat File name: %APPDATA%\bronnetdomlist.bat
File type: Batch file
Mime Type: unknown/bat
Group: Malware file
%APPDATA%\br7911on.exe File name: %APPDATA%\br7911on.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\Bron.tok-9-10 File name: %APPDATA%\Bron.tok-9-10
Mime Type: unknown/tok-9-10
Group: Malware file
%APPDATA%\csrss.exe File name: %APPDATA%\csrss.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\inetinfo.exe File name: %APPDATA%\inetinfo.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\Kosong.Bron.Tok.txt File name: %APPDATA%\Kosong.Bron.Tok.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\lsass.exe File name: %APPDATA%\lsass.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\loc.mail.bron.tok File name: %APPDATA%\loc.mail.bron.tok
Mime Type: unknown/tok
Group: Malware file
%APPDATA%\Ok-SendMail-Bron-tok File name: %APPDATA%\Ok-SendMail-Bron-tok
Group: Malware file
%APPDATA%\svchost.exe File name: %APPDATA%\svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\smss.exe File name: %APPDATA%\smss.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\services.exe File name: %APPDATA%\services.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\winlogon.exe File name: %APPDATA%\winlogon.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%USERPROFILE%\Templates\Brengkolang.com File name: %USERPROFILE%\Templates\Brengkolang.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\Templates\WowTumpeh.com File name: %USERPROFILE%\Templates\WowTumpeh.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\Templates\14004-nendangbro.com File name: %USERPROFILE%\Templates\14004-nendangbro.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\My Documents\My Pictures\about.Brontok.A.html - contains the body of the email it sends out File name: %USERPROFILE%\My Documents\My Pictures\about.Brontok.A.html - contains the body of the email it sends out
Mime Type: unknown/html - contains the body of the email it sends out
Group: Malware file
%USERPROFILE%\Start Menu\Programs\Startup\empty.pif File name: %USERPROFILE%\Start Menu\Programs\Startup\empty.pif
Mime Type: unknown/pif
Group: Malware file
%windir%\eksplorasi.pif File name: %windir%\eksplorasi.pif
Mime Type: unknown/pif
Group: Malware file
%windir%\eksplorasi.exe File name: %windir%\eksplorasi.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\berasjatah.exe File name: %windir%\berasjatah.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-dezjlph.exe File name: %windir%\sembako-dezjlph.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-dfzjlog.exe File name: %windir%\sembako-dfzjlog.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjlji.exe File name: %windir%\sembako-cmzjlji.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cnzjlpi.exe File name: %windir%\sembako-cnzjlpi.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjkji.exe File name: %windir%\sembako-cmzjkji.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjlii.exe File name: %windir%\sembako-cmzjlii.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-somljimc.exe File name: %windir%\shellnew\bbm-somljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-toslphed.exe File name: %windir%\shellnew\bbm-toslphed.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-qotlpinc.exe File name: %windir%\shellnew\bbm-qotlpinc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-rpqlogfd.exe File name: %windir%\shellnew\bbm-rpqlogfd.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-vrqliimc.exe File name: %windir%\shellnew\bbm-vrqliimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-xomljimc.exe File name: %windir%\shellnew\bbm-xomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-trqliimc.exe File name: %windir%\shellnew\bbm-trqliimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-vqslphed.exe File name: %windir%\shellnew\bbm-vqslphed.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-zomljimc.exe File name: %windir%\shellnew\bbm-zomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-xtvkjimc.exe File name: %windir%\shellnew\bbm-xtvkjimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-yomljimc.exe File name: %windir%\shellnew\bbm-yomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\sempalong.exe File name: %windir%\shellnew\sempalong.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-olx.exe File name: %windir%\system32\cmd-bro-olx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-plx.exe File name: %windir%\system32\cmd-bro-plx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-ilx.exe File name: %windir%\system32\cmd-bro-ilx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-jkx.exe File name: %windir%\system32\cmd-bro-jkx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-jlx.exe File name: %windir%\system32\cmd-bro-jlx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\drivers\etc\hosts-denied by-%UserName%.com File name: %windir%\system32\drivers\etc\hosts-denied by-%UserName%.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%windir%\system32\%UserName%'s Setting.scr File name: %windir%\system32\%UserName%'s Setting.scr
Mime Type: unknown/scr
Group: Malware file
%windir%\system32\dxblcw.exe File name: %windir%\system32\dxblcw.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblbk.exe File name: %windir%\system32\dxblbk.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblbt.exe File name: %windir%\system32\dxblbt.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblai.exe File name: %windir%\system32\dxblai.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblap.exe File name: %windir%\system32\dxblap.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Tok-Cirrhatus" = "%APPDATA%\smss.exe"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot "AlternateShell" = "cmd-bro-olx.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "Bron-Spizaetus" = "%windir%\shellnew\sempalong.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Tok-Cirrhatus-3444" = "%APPDATA%\br7911on.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "explorer.exe "%windir%\berasjatah.exe"""HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap "ProxyBypass" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = "1"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoFolderOptions" = "1"
Loading...