Threat Database Viruses ALS.Bursted.C

ALS.Bursted.C

By GoldSparrow in Viruses

Threat Scorecard

Popularity Rank: 15,207
Threat Level: 80 % (High)
Infected Computers: 731
First Seen: November 26, 2012
Last Seen: February 5, 2026
OS(es) Affected: Windows

ALS.Bursted.C is a virus that is written in the AutoLisp scripting language used by AutoCAD. While being executed, ALS.Bursted.C creates copy of itself as the particular file. ALS.Bursted.C then corrupts all .lsp files inside the support folder listed above by attaching itself to the end of the clean .lsp file.

File System Details

ALS.Bursted.C may create the following file(s):
# File Name Detections
1. %ProgramFiles%\AutoCAD 2008\support\acaddoc.lsp

Analysis Report

General information

Family Name: Virus.Angry Angel.A
Signature status: No Signature

Known Samples

MD5: 45bfce4d06702186aceea5f1c31d8dd5
SHA1: c3f3deeccc3ae253f9db07fc85bfac6d66a57371
SHA256: EF7C8AE04E45A035261A0DB7A7C9CE6FA72F6A58A572944E6468B8C67E3651B2
File Size: 91.34 KB, 91338 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name www.winchiphead.com
File Description EXE For Driver Installation
File Version 1, 4, 0, 0
Internal Name SETUP
Legal Copyright Copyright (C) W.ch 2001-2007
Original Filename SETUP.EXE
Product Name Setup.exe
Product Version 1.40

File Traits

  • 2+ executable sections
  • HighEntropy
  • Installer Version
  • virut
  • x86

Block Information

Total Blocks: 180
Potentially Malicious Blocks: 43
Whitelisted Blocks: 121
Unknown Blocks: 16

Visual Map

? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? x x x x x x x x 0 x 0 x 0 x x x 0 x x x x 0 x x x 0 x x x 0 x x 0 x 0 x x x x x x 0 x x x x x x x x x x x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list::c:\users\user\downloads\c3f3deeccc3ae253f9db07fc85bfac6d66a57371_0000091338 c:\users\user\downloads\c3f3deeccc3ae253f9db07fc85bfac6d66a57371_0000091338:*:enabled:@shell32.dll,-1 RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...