Home / malware DDoS:MSIL/Bracobo.A
First posted on 29 January 2015.
Source: MicrosoftAliases :
There are no other names known for DDoS:MSIL/Bracobo.A.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
- %APPDATA%\microsoft\aelookupsvi.exe
- %APPDATA%\microsoft\profsvc.exe
\c73937393.bat
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Application Experience"
With data: "%APPDATA%\microsoft\aelookupsvi.exe"
The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.
Payload
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- camohomohopper.no-ip.biz using port 55151
- camohomopopper.no-ip.biz using port 55152
This malware description was published using automated analysis of file SHA1 6b414947e04c3e3d99b60dced26e760441276d57. Symptoms
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
The following can indicate that you have this threat on your PC:
- You see these files:
- %APPDATA%\microsoft\aelookupsvi.exe
- %APPDATA%\microsoft\profsvc.exe
\c73937393.bat
- You see registry modifications such as:
- In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Application Experience"
With data: "%APPDATA%\microsoft\aelookupsvi.exe"
- The presence of a mutex such as:
- DC_MUTEX-FY6YKFW
Last update 29 January 2015