Threat Database Worms Win32/Yeltminky

Win32/Yeltminky

By Domesticus in Worms

Threat Scorecard

Threat Level: 50 % (Medium)
Infected Computers: 24
First Seen: March 14, 2012
Last Seen: November 1, 2019
OS(es) Affected: Windows

Win32/Yeltminky is a worm application that can contact a remote host to provide notification of a successful infection. The host URL is provided in the configuration data. Win32/Yeltminky is distributed via networked and removable drives. Win32/Yeltminky checks for all drives available from A: to Z:, and if detected, it copies itself in the root directory of the drive and creates a corresponding 'autorun.inf' file to assure its execution. The file name Win32/Yeltminky uses to replicate itself to is provided in configuration data stored in Win32/Yeltminky. Win32/Yeltminky connects to a remote host, where it gets a list of arbitrary files to download and execute. Win32/Yeltminky incorporates a list of processes which it terminates if found executing on the compromised PC. Win32/Yeltminky modifies the Windows registry so that it can launch every time you start your PC. Win32/Yeltminky also modifies the Hosts file in a try to block victims from accessing legitimate anti-virus websites. The list of blocked websites is carried by the malware, or obtained from a remote host, which is specified in the configuration data carried by Win32/Yeltminky. Win32/Yeltminky can also modify the web browser start page to redirect to a specific URL. The URL is provided in the configuration data carried by Win32/Yeltminky.

SpyHunter Detects & Remove Win32/Yeltminky

File System Details

Win32/Yeltminky may create the following file(s):
# File Name MD5 Detections
1. file.exe 263d019dd8c6ae68cd73714ead701291 0
2. SafeDrvse.exe 151ac60e12d7a7a98908befe9ce50c8f 0
3. SafeDrvse.exe a331755b41502c356826649cb8d1ef78 0

Registry Details

Win32/Yeltminky may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run = "SysAnti" = "%ProgramFiles%\common files\sysanti.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run "auto" = "%ProgramFiles%\common files\auto.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options

Related Posts

Trending

Most Viewed

Loading...