Besoin d’aide ? Fais appel à la communauté ou embauche un spécialiste.
Aller à Avira Answers
Date discovered:20/05/2013
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
Static file:Yes
File size:87040 Bytes
MD5 checksum:D8362A96F0F2920A82D8F41EC342A679
VDF version: - Monday, May 20, 2013
IVDF version: - Monday, May 20, 2013

 General Method of propagation:
   • No own spreading routine

   •  Symantec: Downloader.Liftoh
   •  Mcafee: Atermis!D8362A96F0F2
   •  Kaspersky: BAckdoor.Win32.CPD.phs
   •  TrendMicro: WORM_KBFACe.QMU
   •  F-Secure: Gen:Variant.Symmi.21280
   •  Sophos: Troj/DwnLdr-KUW
   •  Bitdefender: Trojan.GenericKDV.1003140
     Avast: Win32,Agent-AREQ[Trj]
     Microsoft: Win32/Alureon.GC
     AVG: Downloader.Generic13.AUTC
   •  Eset: Win32/Gapz.E
     GData: Trojan.GenericKDV.1003140
     DrWeb: Trojan.Gapz.17
     Ikarus: Backdoor.Win32.CPD

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Registry modification

 Files It copies itself to the following location:
   • %AllUsersProfile%\Application Data\%random%.exe

 Registry The following registry key is continuously in an infinite loop added in order to run the process after reboot.

   • "%random%"="%allusersprofiles%\application data\%random%.exe"

The following registry key is added:

   • "CurrentPath111"="%allusersprofiles%\application data\%random%.exe"

 Backdoor Contact server:
One of the following:
   • r.gig**********
   • x.da**********

This is done via the HTTP POST method using a PHP script.

Description insérée par Soe-liang Tan le mercredi 22 mai 2013
Description mise à jour par Soe-liang Tan le mercredi 22 mai 2013

Retour . . . .
https:// Cet écran est crypté pour votre sécurité.