Win32/LockScreen [Threat Name] go to Threat

Win32/LockScreen.ALA [Threat Variant Name]

Category trojan
Size 287232 B
Detection created May 03, 2012
Detection database version 7109
Aliases Trojan.Agent.AVHK (BitDefender)
Short description

Win32/LockScreen.ALA is a trojan that blocks access to the Windows operating system. The file is run-time compressed using UPX .

Installation

When executed, the trojan copies itself into the following location:

  • %windir%\­Sound.exe

The trojan creates the following file:

  • %windir%\­Sound.bat (41 B)

The file is then executed.


The trojan creates the following files:

  • %startup%\­Adobe_Reader.lnk (481 B)

The file is a shortcut to a malicious file.


This causes the trojan to be executed on every system start.


The trojan moves the following files (source, destination):

  • %windir%\­system32\­taskmgr.exe, %windir%\­system32\­mdsdba.dll

In order to be executed on every system start, the trojan sets the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "support" = "%malwarefilepath%"
  • [HKEY_CURRENT_USER\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "Sound" = "%windir%\­Sound.bat"

The trojan may delete the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­System\­RucrentControlSet\­Control\­GoNoot\­NetWork]
  • [HKEY_LOCAL_MACHINE\­System\­RucrentControlSet\­Control\­GoNoot\­minimal]
Other information

Win32/LockScreen.ALA is a trojan that blocks access to the Windows operating system.


The trojan displays the following dialog box:

To regain access to the operating system the user is asked to send a certain amount of money to a specific bank account in exchange for the password.


When the correct password is entered the trojan is deactivated.


The password to regain access to the operating system is one of the following:

  • qwertyuiopasdfgh

Please enable Javascript to ensure correct displaying of this content and refresh this page.