Threat Description

Rootkit:​W32/Agent.UG

Details

Aliases: Rootkit:​W32/Agent.UG, Worm.Win32.AutoRun.lyo
Category: Malware
Type: Rootkit
Platform: W32

Summary



A program or set of programs which hides itself by subverting or evading the computer's security mechanisms, then allows remote users to secretly control the computer's operating system.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details



This rootkit will execute on the following operating systems:

  • Windows 2000
  • Windows XP
  • Windows 2003
  • Windows Vista
  • Windows Vista SP1

It removes the hooked addresses corresponding to the following NT Functions (which are implemented in Ntoskrnl.exe), then restores them to their original values:

  • NtProtectVirtualMemory
  • NtOpenThread
  • NtTerminateThread
  • NtCreatePort
  • NtConnectPort
  • NtCreateKey
  • NtAdjustPrivilegesToken
  • NtCreateFile
  • NtWriteVirtualMemory
  • NtOpenProcess
  • NtCreateProcess
  • NtCreateProcessEx
  • NtCreateSection
  • NtCreateThread
  • NtDeleteKey
  • NtDeleteValueKey
  • NtDuplicateObject
  • NtEnumerateKey
  • NtEnumerateValueKey
  • NtLoadDriver
  • NtLoadKey
  • NtLoadKey2
  • NtNotifyChangeKey
  • NtOpenFile
  • NtOpenKey
  • NtOpenSection
  • NtQueryKey
  • NtQueryMultipleValueKey
  • NtQueryValueKey
  • NtReplaceKey
  • NtRestoreKey
  • NtResumeThread
  • NtSaveKey
  • NtSetContextThread
  • NtSetInformationFile
  • NtSetInformationKey
  • NtSetSystemInformation
  • NtSetValueKey
  • NtSuspendThread
  • NtSystemDebugControl
  • NtTerminateProcess





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More