Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:13/10/2012
Type:Backdoor Server
In the wild:No
Reported Infections:Medium to high
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:49.664 Bytes
MD5 checksum:746f911c631411f611308eaafb6c353d
VDF version: - Saturday, October 13, 2012
IVDF version: - Saturday, October 13, 2012

 General Method of propagation:
   • No own spreading routine

   •  Mcafee: BackDoor-FIT
   •  Kaspersky: Backdoor.MSIL.Agent.gza
   •  TrendMicro: BKDR_SYSIE.A
   •  Sophos: Mal/Rabashe-A
   •  Bitdefender: Trojan.Agent.AXAG
     Microsoft: Backdoor:Win32/Rabasheeta.A
     AVG: BackDoor.Agent.ASDF
   •  Panda: Bck/Rabasheeta.A
   •  Eset: MSIL/Rabasheeta.A
     DrWeb: BackDoor.Rabasheeta.1
     Ikarus: Backdoor.Win32.Rabasheeta
     Norman: W32/Agent.AJQBO

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Drops a malicious file
   • Registry modification
   • Steals information

 Files It copies itself to the following location:
   • %SYSDIR%\iesys.exe

 Registry The following registry key is added in order to run the process after reboot:

   • "D8812EB1"="%SYSDIR%\iesys.exe"

Description inserted by Eric Burk on Friday, November 9, 2012
Description updated by Eric Burk on Friday, November 9, 2012

Back . . . .