Home / malware HackTool:Win32/Dohuk
First posted on 30 January 2015.
Source: MicrosoftAliases :
There are no other names known for HackTool:Win32/Dohuk.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
- %APPDATA%\winrar\python27.dll
- %APPDATA%\winrar\w9xpopen.exe
- %APPDATA%\winrar\winrar.exe
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Winrar"
With data: "%APPDATA%\winrar\winrar.exe"
Payload
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- download1074.mediafire.com using port 80
- download1589.mediafire.com using port 80
- download1519.mediafire.com using port 80
- download1076.mediafire.com using port 80
- download1582.mediafire.com using port 80
- download1505.mediafire.com using port 80
- download1324.mediafire.com using port 80
- download843.mediafire.com using port 80
- download948.mediafire.com using port 80
- download943.mediafire.com using port 80
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
We have seen this threat access online content, including:
This malware description was published using automated analysis of file SHA1 b9cd9c5b6673db452b90a496b955e0e057b457b7.Symptoms
- _ssl.pyd
- bot.exe
- _hashlib.pyd
- w9xpopen.exe
- python27.dll
The following can indicate that you have this threat on your PC:
- You see these files:
- %APPDATA%\winrar\python27.dll
- %APPDATA%\winrar\w9xpopen.exe
- %APPDATA%\winrar\winrar.exe
- %USERPROFILE%\local settings\temporary internet files\content.ie5\4latwvsh\python27[1].dll
- %USERPROFILE%\local settings\temporary internet files\content.ie5\ah2d4t2z\bot[1].exe
- %USERPROFILE%\local settings\temporary internet files\content.ie5\ctirg5gl\w9xpopen[1].exe
- You see registry modifications such as:
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Winrar"
With data: "%APPDATA%\winrar\winrar.exe"
Last update 30 January 2015