Dialer.Lohan

Dialer.Lohan

Updated:
13 February 2007
Version:
1.0.0.2
Publisher:
ConnectSwitch
Risk Impact:
High
File Names:
Arr.exe
Systems Affected:
Windows

Behavior


Dialer.Lohan is a dialer application that can be used to access various material by dialing high-cost numbers using a modem. Most of the accessible material is pornographic.

Symptoms


  • A Web page appears inviting the user to access pornographic services via a premium-rate phone number.
  • The files on the system are detected as Dialer.Lohan.


Behavior


The most common installation method of this dialer application is through various Web sites, mainly pornographic in nature.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 01 February 2015 revision 020
  • Initial Daily Certified version 11 September 2003
  • Latest Daily Certified version 17 January 2008 revision 033
  • Initial Weekly Certified release date 11 September 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Dialer.Lohan is executed, it performs the following actions:
  1. Copies itself to the %System% folder using the same name as the file that was originally run on the computer.


    Note: %System% is a variable. The dialer locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

  2. Adds the subkeys:
    • .cxq
    • .mxq
    • .mxqfile

      to the registry key:

      HKEY_LOCAL_MACHINE\SOFTWARE\Classes

  3. Adds the subkey:

    MS-Connect

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\

  4. Adds the subkey:

    {8B22270A-71D9-4AB9-B11A-2EA1E5292F42}

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\

  5. Adds the value:

    "MS-RunKey" = "%System%\<filename>"

    to the registry key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  6. Adds the value:

    "{8B22270A-71D9-4AB9-B11A-2EA1E5292F42}" = "{8B22270A-71D9-4AB9-B11A-2EA1E5292F42}!1,0,0,2"

    to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\ClsidFeature



  1. Update the virus definitions.
  2. Close modem connections
  3. Run a full system scan and delete all the files detected as Dialer.Lohan.
  4. Delete the values that were added to the registry.
For specific details on each of these steps, read the following instructions.

1. Updating the virus definitions
Symantec Security Response fully tests all the virus definitions for quality assurance before they are posted to our servers. There are two ways to obtain the most recent virus definitions:
  • Running LiveUpdate, which is the easiest way to obtain virus definitions: These virus definitions are posted to the LiveUpdate servers once each week (usually on Wednesdays), unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, refer to the Virus Definitions (LiveUpdate).
  • Downloading the definitions using the Intelligent Updater: The Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). You should download the definitions from the Symantec Security Response Web site and manually install them. To determine whether definitions for this threat are available by the Intelligent Updater, refer to the Virus Definitions (Intelligent Updater).

    The Intelligent Updater virus definitions are available: Read "How to update virus definition files using the Intelligent Updater" for detailed instructions.

2. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.

3. Scanning for and deleting the infected files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information on how to do this, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as infected with Dialer.Lohan, click Delete.


4. Deleting the values from the registry

WARNING: Symantec strongly recommends that you back up the registry before making any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify the specified keys only. Read the document, "How to make a backup of the Windows registry ," for instructions.
  1. Click Start, and then click Run. (The Run dialog box appears.)
  2. Type regedit

    Then click OK. (The Registry Editor opens.)

  3. Navigate to the key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Classes

  4. Delete the subkeys:
    • .cxq
    • .mxq
    • .mxqfile

  5. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\

  6. Delete the subkey:

    MS-Connect

  7. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\

  8. Delete the subkey:

    {8B22270A-71D9-4AB9-B11A-2EA1E5292F42}

  9. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

  10. In the right pane, delete the value:

    "MS-RunKey" = "%System%\<filename>"

  11. Navigate to the key:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\ClsidFeature

  12. In the right pane, delete the value:

    "{8B22270A-71D9-4AB9-B11A-2EA1E5292F42}" = "{8B22270A-71D9-4AB9-B11A-2EA1E5292F42}!1,0,0,2"

  13. Exit the Registry Editor.


Writeup By: Fergal Ladley