Home / malware Backdoor:Win32/Fynloski.R
First posted on 07 July 2015.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Fynloski.R.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
\system.pif - %APPDATA% \roaming\installdir\help.exe
\anonymous - copia.png \blackcircle@2x.png \system.pif \x.exe - %USERPROFILE% \documents\dcscmin\imdcsc.exe
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "DarkComet RAT"
With data: "%USERPROFILE%\documents\dcscmin\imdcsc.exe" In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Sets value: "help"
With data: "%USERPROFILE%\appdata\roaming\installdir\help.exe"
In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "UserInit"
With data: "\userinit.exe,c:\users\administrator\documents\dcscmin\imdcsc.exe"
The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.
Payload
Allows backdoor access and control
This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:
- Deleting files
- Downloading and running files
- Logging your keystrokes or stealing your sensitive data
- Modifying your system settings
- Running or stopping applications
- Spreading malware to other PCs
- Uploading files
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- networksecurityx.hopto.org using port 80
- b.config.skype.com using port 53
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
This malware description was published using automated analysis of file SHA1 32a6d7777b6bbcc9d9ff05d36291a88732dc7948.
Symptoms
The following can indicate that you have this threat on your PC:
- You see a file similar to:
\system.pif - %APPDATA% \roaming\installdir\help.exe
\anonymous - copia.png \blackcircle@2x.png \system.pif \x.exe - %USERPROFILE% \documents\dcscmin\imdcsc.exe
- You see registry modifications such as:
- In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "DarkComet RAT"
With data: "%USERPROFILE%\documents\dcscmin\imdcsc.exe"
- In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "help"
With data: "%USERPROFILE%\appdata\roaming\installdir\help.exe"
- In subkey: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Sets value: "UserInit"
With data: "\userinit.exe,c:\users\administrator\documents\dcscmin\imdcsc.exe" Last update 07 July 2015