Threat Database Worms MSIL.Pizzer

MSIL.Pizzer

By JubileeX in Worms

Threat Scorecard

Ranking: 3,716
Threat Level: 10 % (Normal)
Infected Computers: 1,895
First Seen: May 28, 2013
Last Seen: September 18, 2023
OS(es) Affected: Windows

MSIL.Pizzer is a worm that circulates through file sharing applications and social media services. MSIL.Pizzer also aims to mine BitCoin data.

MSIL.Pizzer needs .NET Framework version 2.0 or later to be executed. When MSIL.Pizzer is executed, it downloads a file from the certain location. MSIL.Pizzer saves it as the specific file and executes it. MSIL.Pizzer then creates the registry entry, so that it can launch automatically whenever Windows is started. MSIL.Pizzer distributes hack tools from the particular locations for stealing Facebook account information and passwords from Google Chrome, Mozilla Firefox, and Internet Explorer. MSIL.Pizzer then updates the Facebook Wall of the stolen account with the specific message. MSIL.Pizzer also creates the malevolent file. MSIL.Pizzer searches for all .zip and .rar files on all logical drives found on the corrupted PC and embeds itself into the archives if WinRAR is installed. MSIL.Pizzer then creates the script file. The script file sends the message to all contacts it founded in Skype. MSIL.Pizzer creates a copy of itself as the infected file with an 'autorun.inf' file and sets the attributes of both files to hidden. MSIL.Pizzer creates a copy of itself as the infected files.

File System Details

MSIL.Pizzer may create the following file(s):
# File Name Detections
1. [LOGICAL DRIVE LETTER]:\ntldr.exe
2. %UserProfile%\Application Data\AudioDrivers.exe
3. C:\Documents and Settings\\Local Settings\Application Data\Microsoft\Messenger\[FOLDER NAME]\mypornpics.scr
4. %UserProfile%\Application Data\s4c.vbs
5. %UserProfile%\Application Data\temp48.txt
6. C:\Documents and Settings\\Local Settings\Application Data\Microsoft\Yahoo Messenger\[FOLDER NAME]\ys.scr

Registry Details

MSIL.Pizzer may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Nividia Video Driver" = "[PATH TO WORM]\[WORM FILE NAME].exe"

Trending

Most Viewed

Loading...