Home > Threat descriptions >

Virus:W32/Expiro.A

Classification

Category: Malware

Type: Virus

Aliases: W32/Expiro, PE_EXPIRO.A, Expiro.A, W32.Kakavex, Virus.Win32.Expiro.a, W32/Expiro.A

Summary


Expiro.A is a Windows executable file infecting virus. It is also capable of stealing credit card information gathered from the affected machine.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


Expiro.A is a Windows executable file infecting virus. It is also capable of stealing credit card information gathered from the affected machine. Upon execution, this virus recursively looks for link files (.LNK) inside drives C: to Z: starting from the root directory and subdirectories and tries to infect the link's target Windows executable. Infected files grow in size and four additional sections are appended at the end of each file. The following describes the appended section details which includes the name, virtual size and physical size, respectively.

  • .data 00020000 0000EA00
  • .text 0000AD40 0000AD40
  • .bss 00005BD8 00000000
  • .data 00001A00 00001A00

Expiro.A creates a duplicate file alongside of infected files named with an .IVR extension. This identifies files it has already infected. Example:

  • %windir%\system32\notepad.exe %windir%\system32\notepad.ivr

This virus steals credit card information via a keylogger scheme. While the virus is active in memory, it monitors and logs credit card information and steals user input data that may be triggered when browsing one of these sites:

  • 53bank.com
  • banking.halifax-online.co.uk
  • barclays.com
  • chechenpress.info
  • crutop.nu
  • ebay.com
  • goldpoll.com
  • goldpoll.com
  • goldpoll.com
  • intgold.com
  • kavkazcenter.com
  • kgbrelaxclub.ru
  • kidos-bank.ru
  • master-x.com
  • myonlineaccounts2.abbeynational.co.uk
  • new.egg.com
  • olb2.nationet.com
  • online-business.lloydstsb.co.uk
  • openbank.com
  • paypal.com
  • seclab.ru
  • securitylab.ru
  • stormpay.com
  • tat-neftbank.ru
  • totallyfreebanking.com
  • welcome3.smile.co.uk
  • www.allahabadbank.com
  • www.b2b-trust.com
  • www.bank-banque-canada.ca
  • www.bankofindia.com
  • www.bankofmadura.com
  • www.bbin.ru
  • www.bmo.com
  • www.candidateverifier.com
  • www.cbr.ru
  • www.cibc.com
  • www.cwbank.com
  • www.icbank.ru
  • www.kmb.ru
  • www.lbcdirect.laurentianbank.ca
  • www.mmbank.ru
  • www.nbc.ca
  • www.netmagister.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.rbc.com
  • www.socks.ac
  • www.uniastrum.ru
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vtb.ru
  • www.worldbank.org
  • www1.hsbc.ca
  • yambo.biz

Expiro.A creates the following mutex when it is running and active in memory:

  • kkq-vx_mtx1

Description Created: 2007-03-13 14:40:21.0

Description Last Modified: 2007-03-15 15:34:12.0