Home / malwarePDF  

HackTool:Win32/Dohuk


First posted on 30 January 2015.
Source: Microsoft

Aliases :

There are no other names known for HackTool:Win32/Dohuk.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %APPDATA%\winrar\python27.dll
  • %APPDATA%\winrar\w9xpopen.exe
  • %APPDATA%\winrar\winrar.exe


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Winrar"
With data: "%APPDATA%\winrar\winrar.exe"



Payload


Connects to a remote host

We have seen this threat connect to a remote host, including:
  • download1074.mediafire.com using port 80
  • download1589.mediafire.com using port 80
  • download1519.mediafire.com using port 80
  • download1076.mediafire.com using port 80
  • download1582.mediafire.com using port 80
  • download1505.mediafire.com using port 80
  • download1324.mediafire.com using port 80
  • download843.mediafire.com using port 80
  • download948.mediafire.com using port 80
  • download943.mediafire.com using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


We have seen this threat access online content, including:

  • _ssl.pyd
  • bot.exe
  • _hashlib.pyd
  • w9xpopen.exe
  • python27.dll
This malware description was published using automated analysis of file SHA1 b9cd9c5b6673db452b90a496b955e0e057b457b7.Symptoms

The following can indicate that you have this threat on your PC:

  • You see these files:
    • %APPDATA%\winrar\python27.dll
    • %APPDATA%\winrar\w9xpopen.exe
    • %APPDATA%\winrar\winrar.exe
    • %USERPROFILE%\local settings\temporary internet files\content.ie5\4latwvsh\python27[1].dll
    • %USERPROFILE%\local settings\temporary internet files\content.ie5\ah2d4t2z\bot[1].exe
    • %USERPROFILE%\local settings\temporary internet files\content.ie5\ctirg5gl\w9xpopen[1].exe
  • You see registry modifications such as:
    • In subkey: HKCU\software\microsoft\windows\currentversion\run
      Sets value: "Winrar"
      With data: "%APPDATA%\winrar\winrar.exe"

Last update 30 January 2015

 

TOP