Home / malwarePDF  

Backdoor:Win32/Comfoo.B


First posted on 04 April 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/Comfoo.B is also known as Trojan horse PSW.Agent.AIBA.dropper (AVG), TR/Dropper.Gen (Avira), Dropped:Trojan.Generic.5722193 (BitDefender), Trojan.DownLoader5.59827 (Dr.Web).

Explanation :

Backdoor:Win32/Comfoo.B is a trojan allows unauthorized remote access and control to an affected computer. The trojan attempts to capture and distribute sensitive information to a remote server for collection by an attacker.


Top

Backdoor:Win32/Comfoo.B is a trojan allows unauthorized remote access and control to an affected computer. The trojan attempts to capture and distribute sensitive information to a remote server for collection by an attacker.



Installation

Backdoor:Win32/Comfoo.B may be installed by other malware. When run, it drops the following files:

  • wtsc.dll
  • tronds.sys


It then registers wtsc.dll as a service, and injects it into Internet Explorer in an effort to hide its presence on the affected computer.

The kernal driver file, tronds.sys, is used to hide:

  • Network ports, by hooking NtDeviceIoControlFile
  • Processes, by hooking NtQuerySystemInformatio
  • Folders and files, by hooking NtQueryDirectoryFile


Payload

Allows backdoor access and control

Backdoor:Win32/Comfoo.B allows unauthorized access and control of an affected computer. An attacker can perform any number of different actions on an affected computer using Backdoor:Win32/Comfoo.B. This could include, but is not limited to, the following actions:

  • Download and execute arbitrary files
  • Upload files
  • Log keystrokes or steal sensitive data
  • Modify system settings
  • Run or terminate applications
  • Delete files


Steals sensitive information

In the wild, we have observed Backdoor:Win32/Comfoo.B stealing the following information from an affected computer:

  • Operating system version
  • CPU (Central Processing Unit)
  • Boot details
  • User account names and types
  • Drives
  • Network connection information
  • Available transport protocols
  • Netbios
  • Installed applications
  • Internet Explorer settings
  • BHO (Browser Helper Object)


The malware attempts to contact a remote server for collection by an attacker. At the time of this writing, the remote server could not be reached.



Analysis by Jim Wang

Last update 04 April 2012

 

TOP

Malware :