Analysis by: Rhena Inocencio

ALIASES:

W32/Pift (McAfee), Virus.Win32.Morto.a (v) (Sunbelt), W32/Fipp-A (Sophos)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: File infector

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This is Trend Micro detection for files which are infected and corrupted due to error(s) in malware coding in the infection routine of PE_MUSTAN.A

  TECHNICAL DETAILS

File Size: Varies
File Type: EXE
Memory Resident: No
Initial Samples Received Date: 13 Aug 2012

Arrival Details

This malware arrives via the following means:

  • Infected with PE_MUSTAN.A

File Infection

This file infector avoids infecting folders containing the following strings:

  • %System%
  • %Windows%

(Note: %System% is the Windows system folder, which is usually C:\Windows\System32.. %Windows% is the Windows folder, which is usually C:\Windows.)

This is the Trend Micro detection for files infected by:

NOTES:

This is Trend Micro detection for files which are infected and corrupted due to error(s) in malware coding in the infection routine of PE_MUSTAN.A

This file infector appends code to the last section of original file without checking for existence of overlay. Thus, it will cause corruption to infected files with overlay.

  SOLUTION

Minimum Scan Engine: 9.200
FIRST VSAPI PATTERN FILE: 9.320.05
FIRST VSAPI PATTERN DATE: 13 Aug 2012
VSAPI OPR PATTERN File: 9.321.00
VSAPI OPR PATTERN Date: 14 Aug 2012

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Remove the malware/grayware file that dropped/downloaded PE_MUSTAN.A-1

  • PE_MUSTAN.A

Step 3

Scan your computer with your Trend Micro product to clean files detected as PE_MUSTAN.A-1. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.