Threat Database Viruses Virus.AutoRun.fb

Virus.AutoRun.fb

By CagedTech in Viruses

Aliases

11 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Sophos Mal/DiskNite-A
Prevx1 Heuristic: Suspicious File With Covert Attributes
McAfee Generic VB.b
F-Secure Virus.Win32.AutoRun.fb
eTrust-Vet Win32/VMalum.JYO
CAT-QuickHeal Worm.AutoRun.fb
BitDefender Trojan.VB.NIM
AVG Worm/VB.BVK
Avast INF:DiskKnight
AntiVir Worm/Autorun.X.1
AhnLab-V3 Win32/AutoRun.worm.126976

SpyHunter Detects & Remove Virus.AutoRun.fb

File System Details

Virus.AutoRun.fb may create the following file(s):
# File Name MD5 Detections
1. Knight.exe ac0408d0daff20338a32e6bceafceece 0

Analysis Report

General information

Family Name: Trojan.Autorun.FB
Signature status: No Signature

Known Samples

MD5: 89eafdaa5f800e88c22cd36ac303fda2
SHA1: 22942533f8c9f11142f9b09048280815933887a5
SHA256: F2A071371F59AA8C522BB2A9701BDBB3D887E127DFC6DD7DE4100CEDE1584DBF
File Size: 1.99 MB, 1992704 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have resources
  • File doesn't have security information
  • File has TLS information
  • File is 64-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • GetConsoleWindow
  • No Version Info
  • x64

Block Information

Total Blocks: 12,541
Potentially Malicious Blocks: 1,318
Whitelisted Blocks: 11,207
Unknown Blocks: 16

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x 0 ? 0 0 0 x x x 0 x x x x x x x x 0 0 x x x x x x x x x x x x x x 0 x x x x x 0 0 x x x x x x x x x x x x 0 0 ? x x ? ? ? ? ? ? ? ? ? ? ? ? x x 0 ? 0 0 0 0 0 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x 0 x x x 0 0 x x 0 0 0 x x x x x x x x x x x x x x x x x x 0 0 0 x x x x x x x x 0 x 0 0 x 0 x x x x x x x x x 0 0 x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x 0 x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x 0 x x 1 x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x x x x x x x x x x x x x 0 x 0 x 0 x x x x x x x x x 0 x 0 x x x x x x x x x x 0 x 0 x x x x x x x x x x x x x x 0 x x x x x x x x 0 x x x x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 0 x 0 x 0 x x x x x 0 x x 0 0 0 x 0 x x x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x x x x x x x x x x x x 0 0 x x x x x x x 0 0 x x x x x x x 0 x x x x x x 0 x x x x x x x x x x x x x x x x x 0 x x x x x x x 0 x x 0 0 0 0 0 0 x x x x x x x 0 0 0 x x x x x x x x x x x x 0 0 0 0 0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x x x x 0 x x x x 0 x x x 0 x x x x x 0 x x x x 0 x 0 x x x 0 0 0 0 x x x x 0 0 0 x 0 x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x 0 0 x 0 0 x 0 x x 0 0 x 0 0 x 0 0 x 0 0 0 x x 0 0 0 0 x 0 0 0 x 0 0 x 0 0 x 0 0 0 x 0 0 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 x 0 x x x 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 x 0 x x x x 0 x 0 x x 0 0 0 0 0 x 0 x x 0 0 0 x 0 x 0 0 x x x x 0 x x 0 x 0 0 0 0 x x 0 x 0 x 0 0 x 0 x 0 x 0 0 x 0 x 0 x 0 x 0 x x x x 0 x 0 x 0 0 0 x 0 0 x x x x 0 0 x 0 0 x x 0 x x x x x 0 x x 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x 0 0 x 0 0 x x x 0 0 x x 0 x x 0 0 0 0 x x x 0 0 0 0 x x x 0 0 x x 0 0 0 x x x x 0 x x 0 0 0 0 x x x x x x 0 x x x x x 0 x x 0 x x x 0 0 x x x 0 x x 0 0 x 0 0 x x 0 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 x 0 x x 0 x 0 x x 0 0 0 0 x 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 x 0 0 0 0 0 0 x 0 x 0 x x 0 0 x x 0 0 x x x x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x x x x 0 x x 0 0 0 0 0 0 0 0 x 0 x x x 0 0 0 0 x x 0 x x x x x 0 x x x 0 x 0 x x x x x 0 x x x x 0 x 0 x x 0 0 0 x 0 0 0 x x 0 0 0 x 0 x 0 x x x x x 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x 0 0 x x 0 0 0 x 0 x 0 x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x 0 0 0 x x x 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 x 0 0 x x 0 0 0 x x 0 x 0 x x 0 0 0 0 0 x 0 0 0 0 x x 0 0 0 0 x x 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Autorun.FB
  • Shellcode.BP

Registry Modifications

Key::Value Data API Name
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
Show More
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenMutant
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenProcessTokenEx
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSemaphore
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtOpenThreadTokenEx
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryTimerResolution
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSetTimerResolution
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtUpdateWnfStateData
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Keyboard Access
  • GetKeyState
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...