Home / malware TrojanDownloader:Win32/Belot
First posted on 28 November 2014.
Source: MicrosoftAliases :
There are no other names known for TrojanDownloader:Win32/Belot.
Explanation :
Threat behavior This threat can create files on your PC, including:
- %APPDATA%\chromenet.exe
- %LOCALAPPDATA%\google\chrome\user data\abc\extensions\caipkhppmjbppefcdohjhbniihldppbf\ext.dll
- %ProgramFiles%\internet explorer\iexplore1.exe
- %USERPROFILE%\desktop\google chrome.exe
- c:\users\administrator\appdata\local\google\chrome\user data\abc\extensions\caipkhppmjbppefcdohjhbniihldppbf\ext.dll
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "chromenet"
With data: ""%APPDATA%\chromenet.exe" +e"
Payload
Modifies system settings
This threat can make changes to the way your PC behaves, including:
- Stopping alerts when programs try to make changes to your PC.
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to:
- www.fbku.com using port 80
- www.mjux.com using port 80
- Check for an Internet connection.
- Download and run files (including updates or other malware).
- Report a new infection to its author.
- Receive configuration or other data.
- Receive instructions from a malicious hacker.
- Search for your PC location.
- Upload information taken from your PC.
- Validate a digital certificate.
We have seen this threat access online content, including:
This malware description was published using automated analysis of file SHA1 8ffc2a802ecd158b1b9dde229f4b1a7deebd68f1. Symptoms
- exelink.txt
- background.js
The following can indicate that you have this threat on your PC:
- You see these files:
- %APPDATA%\chromenet.exe
- %LOCALAPPDATA%\google\chrome\user data\abc\extensions\caipkhppmjbppefcdohjhbniihldppbf\ext.dll
- %ProgramFiles%\internet explorer\iexplore1.exe
- %USERPROFILE%\desktop\google chrome.exe
- c:\users\administrator\appdata\local\google\chrome\user data\abc\extensions\caipkhppmjbppefcdohjhbniihldppbf\ext.dll
- You see registry modifications such as:
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "chromenet"
With data: ""%APPDATA%\chromenet.exe" +e"
- In subkey: HKLM\software\microsoft\windows\currentversion\policies\system
Sets value: "EnableLUA"
With data: "0"
Last update 28 November 2014