Viking.H
Summary
Viking.H, a variant of Viking, is a Virus. Viking.H creates files in the Windows directory and downloads and runs a file from website: [http://www.54088.org/backup/[REMOVED]1.exe Viking.H kills processes belonging to anti-virus and security software.
Removal
Manual action
Disinfection of the Viking virus-worm should be performed as follows:
- Disconnect a computer or local network from the Internet.
- Disable network sharing or set strong passwords for all shares.
- Select the "Disinfect Automatically" action for F-Secure Anti-Virus real-time scanners on all computers. With "Disinfect Automatically" selected, F-Secure Anti-Virus will disinfect files that a virus tries to infect over a network (if sharing was not disabled).
- Scan all files on all drives on all computers and MANUALLY select the "Disinfect" action to disinfect all infected files and to rename the virus droppers. DO NOT select automatic disinfection option after the scan!
- Restart all disinfected computers.
- Scan all hard drives on disinfected computers again to make sure that no more infected files are left. If needed, repeat disinfection procedure.
- Disinfect all infected computers connected on the network.
- Enable network sharing, keep strong share passwords.
- Reconnect the disinfected computer or local network to the Internet.
Please note that because of the "Worm." detection prefix F-Secure Anti-Virus will suggest to delete infected files, but DO NOT select the "Delete" option because this worm also has a viral component and you don't want to delete all infected files instead of disinfecting them. At the same time, the worm's dropper and downloader files should be deleted from a computer to prevent re-infection. See the names of the dropper and downloader files in the Details section.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
- Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
- Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
- Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
Technical Details
Once an infected file is executed, Viking.H will drop the following files in the Windows directory:
- Logo1_.exe - Infector
- vDll.dll - Downloader
The .DLL component is injected into IEXPLORE.EXE. Viking.H adds the following registry entry as a part of its installation:
- [HKLM\SOFTWARE\Soft\DownloadWWW] auto = "1"
It creates the following text files where it writes some information related to its activities:
- C:\gamevir.txt
- C:\log.txt
Viking.H is a prepending virus that searches for files starting from fixed drives from the Z: to C: drives.It infects files with the following extension:
- exe
It avoids infecting files with the following strings in its path or filename:
- \Program Files\
- Common Files
- ComPlus Applications
- Documents and Settings
- InstallShield Installation Information
- Internet Explorer
- Messenger
- Microsoft Frontpage
- Microsoft Office
- Movie Maker
- MSN
- MSN Gaming Zone
- NetMeeting
- Outlook Express
- Recycled
- system
- System Volume Information
- system32
- windows
- Windows Media Player
- Windows NT
- WindowsUpdate
- winnt
In order for the host file to execute, Viking.H creates a backup copy of the itself in the current directory as [filename].exe.exe and then drops and executes the original uninfected host file as [filename].exe. After which, it will now delete the uninfected host file and renames the backup file to the original filename. Viking.H is able to do this with the help of a temporary batch file created in the temporary folder as $$.bat. Viking.H sends the message "Hello, World" to the following IP address via Internet Control Message Protocol (ICMP) :
- 192.168.0.30
- 192.168.8.1
It also attempts to propagate via network shares by copying itself to the following shared folders:
- admin$
- ipc$
- with the following accounts:
- administrator
- guest
It stops the following service:
- "Kingsoft AntiVirus Service"
It terminates the following processes that are often related to Anti-virus products:
- EGHOST.EXE
- IPARMOR.EXE
- KAVPFW.EXE
- MAILMON.EXE
- RavMon.exe
- RavMonClass
Viking.H attempts to download and execute files from the following site:
- https://www.54088.org/backup/[REMOVED]1.exe
Note: This site is already down.
More Support
Community
Ask questions in our Community.
User guides
Check the user guide for instructions.
Contact Support
Chat with with or call an agent.
Submit a Sample
Submit a file or URL for analysis.