Home Malware Programs Worms Worm:Win32/Brontok.AS@mm

Worm:Win32/Brontok.AS@mm

Posted: January 14, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 96
First Seen: August 27, 2012
Last Seen: July 7, 2020
OS(es) Affected: Windows

Worm:Win32/Brontok.AS@mm is a mass-mailing email worm that changes certain computer settings, such as display of hidden files. Worm:Win32/Brontok.AS@mm also disables registry editing. Worm:Win32/Brontok.AS@mm circulates by sending a copy of itself, as an email attachment, to contacts existing on your computer. Worm:Win32/Brontok.AS@mm is also able to copy itself to USB, removable drives and shared folders. When installed on the compromised PC, Worm:Win32/Brontok.AS@mm makes system changes by dropping numerous potentially malicious files and making registry modifications. While being run, Worm:Win32/Brontok.AS@mm opens a Windows Explorer window to the "My Documents" folder. Worm:Win32/Brontok.AS@mm uses the Windows "new folder" icon for its copies. This may cause the file to occur as if it were a new folder rather than an executable file, attracting PC users into accidentally running Worm:Win32/Brontok.AS@mm. Worm:Win32/Brontok.AS@mm modifies the registry entries to assure that its copy runs automatically every time you start Windows.

Aliases

Win32/Brontok.worm.42579 [AhnLab-V3]Heuristic.BehavesLike.Win32.Suspicious-BAY.K [McAfee-GW-Edition]Worm/Brontok.QA [AntiVir]Worm.Win32.Brontok.CV [Comodo]W32/Brontok.CM@mm [F-Prot]W32/Brontok.N@mm [Fortinet]Win32/Brontok.worm.45568.E [AhnLab-V3]Win32/Robknot.CA [eTrust-Vet]Heuristic.LooksLike.Win32.Suspicious.F [McAfee-GW-Edition]TR/Crypt.CFI.Gen [AntiVir]Worm.Win32.Brontok.CS [Comodo]W32/Brontok-N [Sophos]Backdoor.Generic.199005 [BitDefender]Worm.Brontok.AI [ClamAV]Win32:Brontok-CE [Avast]
More aliases (71)

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Worm:Win32/Brontok.AS@mm may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



C:\autoexec.bat File name: C:\autoexec.bat
File type: Batch file
Mime Type: unknown/bat
Group: Malware file
%APPDATA%\bronnpath0.txt File name: %APPDATA%\bronnpath0.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\bronfoldnetdomlist.txt File name: %APPDATA%\bronfoldnetdomlist.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\bronnetdomlist.bat File name: %APPDATA%\bronnetdomlist.bat
File type: Batch file
Mime Type: unknown/bat
Group: Malware file
%APPDATA%\br7911on.exe File name: %APPDATA%\br7911on.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\Bron.tok-9-10 File name: %APPDATA%\Bron.tok-9-10
Mime Type: unknown/tok-9-10
Group: Malware file
%APPDATA%\csrss.exe File name: %APPDATA%\csrss.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\inetinfo.exe File name: %APPDATA%\inetinfo.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\Kosong.Bron.Tok.txt File name: %APPDATA%\Kosong.Bron.Tok.txt
Mime Type: unknown/txt
Group: Malware file
%APPDATA%\lsass.exe File name: %APPDATA%\lsass.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\loc.mail.bron.tok File name: %APPDATA%\loc.mail.bron.tok
Mime Type: unknown/tok
Group: Malware file
%APPDATA%\Ok-SendMail-Bron-tok File name: %APPDATA%\Ok-SendMail-Bron-tok
Group: Malware file
%APPDATA%\svchost.exe File name: %APPDATA%\svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\smss.exe File name: %APPDATA%\smss.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\services.exe File name: %APPDATA%\services.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA%\winlogon.exe File name: %APPDATA%\winlogon.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%USERPROFILE%\Templates\Brengkolang.com File name: %USERPROFILE%\Templates\Brengkolang.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\Templates\WowTumpeh.com File name: %USERPROFILE%\Templates\WowTumpeh.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\Templates\14004-nendangbro.com File name: %USERPROFILE%\Templates\14004-nendangbro.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%USERPROFILE%\My Documents\My Pictures\about.Brontok.A.html - contains the body of the email it sends out File name: %USERPROFILE%\My Documents\My Pictures\about.Brontok.A.html - contains the body of the email it sends out
Mime Type: unknown/html - contains the body of the email it sends out
Group: Malware file
%USERPROFILE%\Start Menu\Programs\Startup\empty.pif File name: %USERPROFILE%\Start Menu\Programs\Startup\empty.pif
Mime Type: unknown/pif
Group: Malware file
%windir%\eksplorasi.pif File name: %windir%\eksplorasi.pif
Mime Type: unknown/pif
Group: Malware file
%windir%\eksplorasi.exe File name: %windir%\eksplorasi.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\berasjatah.exe File name: %windir%\berasjatah.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-dezjlph.exe File name: %windir%\sembako-dezjlph.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-dfzjlog.exe File name: %windir%\sembako-dfzjlog.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjlji.exe File name: %windir%\sembako-cmzjlji.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cnzjlpi.exe File name: %windir%\sembako-cnzjlpi.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjkji.exe File name: %windir%\sembako-cmzjkji.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\sembako-cmzjlii.exe File name: %windir%\sembako-cmzjlii.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-somljimc.exe File name: %windir%\shellnew\bbm-somljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-toslphed.exe File name: %windir%\shellnew\bbm-toslphed.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-qotlpinc.exe File name: %windir%\shellnew\bbm-qotlpinc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-rpqlogfd.exe File name: %windir%\shellnew\bbm-rpqlogfd.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-vrqliimc.exe File name: %windir%\shellnew\bbm-vrqliimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-xomljimc.exe File name: %windir%\shellnew\bbm-xomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-trqliimc.exe File name: %windir%\shellnew\bbm-trqliimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-vqslphed.exe File name: %windir%\shellnew\bbm-vqslphed.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-zomljimc.exe File name: %windir%\shellnew\bbm-zomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-xtvkjimc.exe File name: %windir%\shellnew\bbm-xtvkjimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\bbm-yomljimc.exe File name: %windir%\shellnew\bbm-yomljimc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\shellnew\sempalong.exe File name: %windir%\shellnew\sempalong.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-olx.exe File name: %windir%\system32\cmd-bro-olx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-plx.exe File name: %windir%\system32\cmd-bro-plx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-ilx.exe File name: %windir%\system32\cmd-bro-ilx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-jkx.exe File name: %windir%\system32\cmd-bro-jkx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\cmd-bro-jlx.exe File name: %windir%\system32\cmd-bro-jlx.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\drivers\etc\hosts-denied by-%UserName%.com File name: %windir%\system32\drivers\etc\hosts-denied by-%UserName%.com
File type: Command, executable file
Mime Type: unknown/com
Group: Malware file
%windir%\system32\%UserName%'s Setting.scr File name: %windir%\system32\%UserName%'s Setting.scr
Mime Type: unknown/scr
Group: Malware file
%windir%\system32\dxblcw.exe File name: %windir%\system32\dxblcw.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblbk.exe File name: %windir%\system32\dxblbk.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblbt.exe File name: %windir%\system32\dxblbt.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblai.exe File name: %windir%\system32\dxblai.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%windir%\system32\dxblap.exe File name: %windir%\system32\dxblap.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Tok-Cirrhatus" = "%APPDATA%\smss.exe"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot "AlternateShell" = "cmd-bro-olx.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run "Bron-Spizaetus" = "%windir%\shellnew\sempalong.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Tok-Cirrhatus-3444" = "%APPDATA%\br7911on.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "explorer.exe "%windir%\berasjatah.exe"""HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap "ProxyBypass" = "1"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System "DisableRegistryTools" = "1"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer "NoFolderOptions" = "1"