Home / malware MonitoringTool:Win32/TektonIt
First posted on 10 September 2015.
Source: MicrosoftAliases :
There are no other names known for MonitoringTool:Win32/TektonIt.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
- %APPDATA%\windows\control\data.exe
- %APPDATA%\windows\control\install.bat
- %APPDATA%\windows\control\rfusclient.exe
- %APPDATA%\windows\control\run.exe
- %APPDATA%\windows\control\rutserv.exe
- %APPDATA%\windows\control\vp8decoder.dll
- %APPDATA%\windows\control\vp8encoder.dll
- %TEMP%\7e04.tmp\run.bat
The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.
Payload
Connects to a remote host
We have seen this threat connect to a remote host. Malware can connect to a remote host to do any of the following:
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
It can stop some processes from running on your PC, including:
- rutserv.exe
This malware description was published using automated analysis of file SHA1 4deeb64a7e55a7095ec800bc50958405850d1930.
Symptoms
The following can indicate that you have this threat on your PC:
- You see a file similar to:
- %APPDATA%\windows\control\data.exe
- %APPDATA%\windows\control\install.bat
- %APPDATA%\windows\control\rfusclient.exe
- %APPDATA%\windows\control\run.exe
- %APPDATA%\windows\control\rutserv.exe
- %APPDATA%\windows\control\vp8decoder.dll
- %APPDATA%\windows\control\vp8encoder.dll
- %TEMP%\7e04.tmp\run.bat
Last update 10 September 2015