Modified by: Vincent Martin Hermosura

ALIASES:

Worm.MSIL.Agent.ck (Kaspersky), Worm:MSIL/Autosipoc.A (Microsoft), W32.SillyFDC (Symmantec), MSIL/AutoCopies (Mcafee), Trojan.Win32.Generic.pak!cobra (Sunbelt), Worm/Autosipoc.A.3 (Antivir), Worm.Generic.324853 (Bitdefender), W32/Agent.CK!worm (Fortinet), Worm.Win32.Msil (Ikarus), Win32/Agent.NJY worm (Esset), Generic (Panda), Worm.MSIL.Agent (Vba32)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Worm

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size: 48,640 bytes
File Type: EXE
Initial Samples Received Date: 15 Aug 2014

Arrival Details

This worm arrives via removable drives.

It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This worm drops the following copies of itself into the affected system:

  • {My Music folder}\Imagenes2.exe
  • {My Pictures folder}\Imagenes2.exe
  • %Start Menu%\Programs\Imagenes2.exe
  • {malware path}\Music.exe

(Note: %Start Menu% is the current user's Start Menu folder, which is usually C:\Windows\Start Menu or C:\Documents and Settings\{User name}\Start Menu on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming\Microsoft\Windows\Start Menu on Windows Vista and 7.)

Propagation

This worm drops the following copy of itself in all physical and removable drives:

  • {drive letter}:\{folder}\..{folder}\{folder name}.exe
    • Note that this worm uses names of existing folders as filenames for its dropped copies