Home / malware Backdoor:Win32/Wkysol.H
First posted on 23 March 2012.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Wkysol.H.
Explanation :
Backdoor:Win32/Wkysol.H is malware that allows backdoor access and control of the affected computer by a remote attacker. It is designed to execute a series of commands on the affected computer.
Top
Backdoor:Win32/Wkysol.H is malware that allows backdoor access and control of the affected computer by a remote attacker. It is designed to execute a series of commands on the affected computer.
Installation
Backdoor:Win32/Wkysol.H is injected into the following processes:
- firefox.exe
- iexplorer.exe
- outlook.exe
It connects to the server "happybehere.com" to send the affected computer's name and IP address to log its presence.
It queries Internet Explorer and Firefox settings for proxy servers used. It then attempts to connect to the Internet using the proxy servers, if available.
Payload
Steals sensitive information
Backdoor:Win32/Wkysol.H performs the following actions to steal sensitive information:
- Log keystrokes
- Log when programs are opened and closed
- Get clipboard contents
- Get certificate and smart card-related information
It stores the logged keystrokes in the file "%AppData%/Local/MSF5F0.dat".
Allows backdoor access and control
Backdoor:Win32/Wkysol.H allows an attacker to perform a number of actions on an affected computer. These actions may include, but are not limited to, the following:
- Get system startup time
- Execute arbitrary commands
- Get computer network information, such as computer name, IP address, subnet mask, gateway information, DNS/DHCP/Proxy/WINS server information
- Copy files
- Move files
- Load a DLL file or execute an API
- Unload a DLL file
- Enumerate files in the affected computer
- Execute files
- Get process-related information, such as process names, CPU times, memory usage, and so on
- Enumerate or get information about open ports in the affected computer
- Uninstall itself
- Restart the affected computer
- Terminate a process
- Get keylogger logs
- Get certificate information
- Get smart card information
- Perform a number of smart card-related commands, such as executing several card-related APIs, setting the header information, settings the certificate information, and so on
The commands are located in an encrypted file named "%AppData%/Local/MSF5F1.dat", which it downloads from "happybehere.com". After decryption, the commands are placed in a file named "%AppData%/Local/MSF5F4.dat".
Analysis by Edgardo Diaz
Last update 23 March 2012