Virus Profile: Downloader-ARL!334999A2

Risk Assessment  
  - Home Users: Low
  - Corporate Users: Low
Date Discovered: 10/7/2008
Date Added: 10/7/2008
Origin: Unknown
Length: 61440
Type: Trojan
SubType: Downloader
DAT Required: 5399

Virus Characteristics

File PropertyProperty Value
FileName~exe~1.exe
McAfee DetectionDownloader-ARL
Length61,440 bytes
CRC334999A2
MD5C899F0D898B95A6ED1D49DAAD3E91D1D
SHA168F31F069153DBC97BF075BA16F7DEDEE942709A

Other Common Detection Aliases

Company NameDetection Name
avastWin32:PureMorph [Cryp]
FortiNetW32/PolySmall.BP!tr
F-ProtW32/FakeAlert.X.gen!Eldorado
KasperskyTrojan.Win32.Obfuscated.gx
SymantecPacked.Generic.182

Avert® Labs has observed the following system activities:

ActivityRisk Level
Enumerates open windows
Medium
Enumerates running processes
Medium
Program often suspends itself
Medium
Uses shared memory of other processes
Low

Other detections that have been observed.

FileNameMcAfee Supported
%ALLUSERSPROFILE%\application data\ofexqxov\gdglghal.exe
Downloader-ARL

System Changes

These are general defaults for typical path variables. (Although they may differ, these examples are common.):
%WinDir% = \WINDOWS (Windows 9x/ME/XP/Vista), \WINNT (Windows NT/2000)
%SystemDir% = \WINDOWS\SYSTEM (Windows 98/ME), \WINDOWS\SYSTEM32 (Windows XP/Vista), \WINNT\SYSTEM32 (Windows NT/2000)
%ProgramFiles% = \Program Files

The following files have been added to the system:

  • %ALLUSERSPROFILE%\application data\ofexqxov
  • %ALLUSERSPROFILE%\application data\ofexqxov\gdglghal.exe
  • The following registry elements have been created:

  • hkey_local_machine\software\microsoft\windows\currentversion\policies\explorer\run\
    • pj8l04eudq = c:\documents and settings\all users\application data
      \ofexqxov\gdglghal.exe
  • hkey_users\s-1-5-21-1202660629-602609370-839522115-500\software\uninstall\
    • pj8l04eudq = 335920
  • The applications created the following network connection(s):

  • http
    • hxxp://67.19.120.141/NL2
      /******************************************************
  • Indications of Infection

    This symptoms of this detection are the files, registry, and network communication referenced in the characteristics section.

    Method of Infection

    Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.


    Removal Instructions

    AVERT recommends to always use latest DATs and engine. This threat will be cleaned if you have this combination.

    Additional Windows ME/XP removal considerations

    Advertisement