Win32/Delf.OHJ [Threat Name] go to Threat

Win32/Delf.OHJ [Threat Variant Name]

Category trojan
Size 101376 B
Detection created Apr 30, 2009
Detection database version 4047
Aliases Trojan-Ransom.Win32.SMSer.az (Kaspersky)
  Suspicious.MH690.A (Symantec)
  Troj/Blocker-B (Sophos)
Short description

Win32/Delf.OHJ is a trojan that blocks access to the Windows operating system. To regain access to the operating system the user is asked to send an SMS message to a specified telephone number in exchange for a password. When the correct password is entered the trojan removes itself from the computer.

Installation

The trojan does not create any copies of itself.


In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "ekzabc" = "%filepath%"

The following Registry entries are created:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­EC]
    • "dw"
    • "dh"
    • "rcnt"
    • "sample"

The following Registry entry is deleted:

  • [HKEY_LOCAL_MACHINE\­SYSTEM\­CurrentControlSet\­Control\­SafeBoot]
Other information

The trojan displays the following dialog box:

The dialog box contains the following text:

  • Операцеонной системой была обнаружена проблема, которая может повродеить вашем
  • Драйвер устройства, вызвавший повреждения был обезврежен
  • Нарушенный драйвер на стеке ядра должны быть заменены рабоч
  • Technical information:
  • ***STOP: 0x000000C4 (0x0000003C, 0x00000000, 0x00000000)
  • восстановить работоспособность вашего компьютера Вам следует сделать следующее:
  • Отправьте SMS с текстом: old ПРОБЕЛ safin/serzh/muzzon/tupak на номер: 4161 (стоимость 10руб. без НДС)! Полученный КОД=ВТОРОЕ СЛОВО в ответном SMS-сообщении  введитев поле (транслитом):
  • A problem has been detected and Windows has been shut down to
  • prevent damage to your Computer.
  • A device driver attempting to corrupt the system has been caught.
  • The faulty driver currently on the kernel stack must be replaced
  • with a working version.
  • Technical information:
  • ***STOP: 0x000000C4 (0x0000003C, 0x00000000, 0x00000000)
  • ***STOP: c000007b Unknown Hard Error Unknown Hard Error Beginning
  • dump of physical memory

When the correct password is entered the trojan removes itself from the computer.


The password to regain access to the operating system is one of the following:

  • vash

The trojan creates the following files:

  • gg.cmd

Please enable Javascript to ensure correct displaying of this content and refresh this page.