Threat Database Worms Worm.Slogod

Worm.Slogod

By Sumo3000 in Worms

Threat Scorecard

Popularity Rank: 19,847
Threat Level: 50 % (Medium)
Infected Computers: 1,579
First Seen: December 23, 2011
Last Seen: February 4, 2026
OS(es) Affected: Windows

Worm.Slogod is a malicious computer worm that infiltrates into the corrupted PC system stealthily through removable drives. Once installed, Worm.Slogod executes MS Notepad and shows an IT themed parody of the 'Our Father' prayer created in French. Worm.Slogod will also disable the system's Autorun settings for removable drives and it will disable the 'File' drop down menu for all system folders. Worm.Slogod will also disable 'System Restore'. Worm.Slogod will cover or deactivate various computer settings, options and tabs such as the 'Documents' shortcut on the Start Menu, or the 'Hardware tab' for the Sounds and Multimedia and the Keyboard and Mouse on the Control Panel. Worm.Slogod also frequently empties the recycle bin without the computer user's knowledge or interruption. Worm.Slogod will also close the 'Command Prompt' when executed. Worm.Slogod will edit the computer's mouse settings and block you from changing or restoring them. Worm.Slogod will load various screensavers. You need to remove Worm.Slogod immediately after detection.

File System Details

Worm.Slogod may create the following file(s):
# File Name Detections
1. ALCMTR.EXE
2. kJbIGuFtdKeYyWT.exe
3. gpag.exe
4. server.exe
5. MTW.exe
6. AudioTreiber_x64.exe
7. Aimza bYpAsS 358.exe
8. audiohd.exe
9. winupdate.exe
10. firefox.exe
11. Explorer.exe
12. m.vbs
13. imwin.jpg
14. system.vbe
15. MLN4.vbs
16. system32.db
17. Imel.dll.vbs
18. su_virus.vbs
19. NewFile.vbs
20. winrun.dll.vbs
21. winjpg.jpg
22. sVirusprotection.vbe

Analysis Report

General information

Family Name: Worm.Runouce.D
Signature status: Hash Mismatch

Known Samples

MD5: fc94a8b1e93a492d65d2261115f68445
SHA1: 9bffc5fd9dcace928354033070ec35b5d922a1b9
SHA256: 581F9CECD5BF8C7F421FC2295FCDABD3C76C64BD7EB75973FDE46CB4B20C4FB6
File Size: 120.32 KB, 120316 bytes
MD5: d4b31d754400780a83cf9d54a33e61db
SHA1: 745e3796c36748ee017a5fd4048c5da8e7d02e8d
SHA256: C7AB81F62D801C137EE2066AC676869F175D2DBCBD9041BF3972F78136425DD8
File Size: 1.42 MB, 1419684 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name
  • QIHU 360 SOFTWARE CO. LIMITED
  • SEIKO EPSON CORPORATION
File Description
  • 360 Total Security Online Installer
  • EPSON Status Monitor 3
File Version
  • 6, 6, 0, 1040
  • 4.02
Internal Name
  • 360Installer
  • E_S40RP7
Legal Copyright
  • (C)Qihu 360 Software Co., Ltd. All rights reserved.
  • Copyright (C) SEIKO EPSON CORP. 2007
Original Filename
  • 360Installer.exe
  • E_S40RP7.EXE
Product Name
  • 360 Total Security Online Installer
  • EPSON Status Monitor 3
Product Version
  • 6, 6, 0, 1040
  • 4.02

Digital Signatures

Signer Root Status
QIHU 360 SOFTWARE CO. LIMITED Symantec Class 3 SHA256 Code Signing CA Hash Mismatch
QIHU 360 SOFTWARE CO. LIMITED VeriSign Class 3 Code Signing 2010 CA Hash Mismatch

File Traits

  • 2+ executable sections
  • HighEntropy
  • Installer Manifest
  • Installer Version
  • x86

Block Information

Total Blocks: 1,929
Potentially Malicious Blocks: 438
Whitelisted Blocks: 1,427
Unknown Blocks: 64

Visual Map

0 x x x x x x x 0 x ? ? 0 0 0 0 0 0 0 0 x x 0 x x x 0 x x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x x x 0 x x x x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x x x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 x x 0 0 x 0 0 0 0 x 0 x 0 x x x 0 0 x x x x x 0 x 0 x x ? x x x 0 x x x ? ? ? x 0 ? ? ? x 0 ? 0 0 0 ? ? ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 ? 0 0 0 0 0 ? x x 0 x 0 x x 0 x x x 0 x 0 0 0 x 0 ? x x x x x ? 0 0 0 0 x x 0 x x ? x x 0 x x x x x ? ? x 1 0 x 0 0 0 0 0 0 ? 0 x 0 x x x x x x x x x x x 0 x x 0 0 0 x x ? x 0 ? x x x ? x 0 0 ? 0 ? x 0 0 0 0 x x x x x x x x x x x x x x x x x x ? x x x 0 ? 0 x x x x x x 0 0 0 x x x 0 x x x x x x x x ? 0 0 x x x 0 x 0 x x x x ? x x x ? ? ? 0 x ? 0 ? x x x x x x ? x x ? 1 x x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 ? ? ? 0 ? x 0 x 0 ? 0 x x x 0 ? ? ? ? ? ? 0 0 x ? x 0 x x ? ? ? ? 0 0 0 x ? 0 0 0 0 0 ? 0 0 x x 0 x x x 0 0 x x x x ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x 0 x x x x x x x x x x x x x x x x x x x x x x x 0 x x 0 0 0 0 0 x x x x x x 0 x x 0 0 x x x 0 0 0 0 x x x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 x x x x 0 0 x x x x x x 0 x x x x 0 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x 0 x 0 0 0 x 0 x x 0 0 x x 0 x x 0 x ? x 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x x x x x x 0 0 x 0 x x x x 0 0 0 x 0 x x 0 0 0 0 0 0 0 0 x x 0 x 0 x x x 0 0 x 0 x x 0 0 x 0 x 0 0 x 0 0 x x 0 x x x x x x x x x x x x 0 0 0 0 0 x 0 0 0 x 0 x x x x x x x x 0 0 0 x 0 0 x x 0 x x 0 0 x 0 0 0 0 0 0 0 x 0 0 0 x 0 0 x 0 0 x 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 x x x x x x x x x 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 x x x 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 2 2 0 0 1 0 0 1 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 2 3 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 2 2 0 0 0 1 0 0 0 1 0 0 0 1 1 0 1 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 ? ? x x x x x x x x x 0 x x x 0 x x 0 x x x 0 x x x x x x x x x x x 0 x x x x x x x x x x x x x x x x x x x 0 x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Related Posts

Trending

Most Viewed

Loading...