Home / malware Worm:Win32/Kasidet.B
First posted on 03 November 2019.
Source: MicrosoftAliases :
Worm:Win32/Kasidet.B is also known as W32/Trojan.FAVQ-2299, TR/Crypt.ZPACK.99635, TROJ_SPNR.0AJ414.
Explanation :
Installation
This threat can create a file on your PC using the name of any of the files it finds in the %SystemRoot% directory. For example explorer.exe, hh.exe, or isuninst.exe. It creates this file in the following location:
%APPDATA%, for example %APPDATA%mymachineexplorer.exe
It creates the following registry entry so that it runs each time you start your PC:
In subkey: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun
Sets value: "%APPDATA%", for example "%APPDATA%mymachineexplorer.exe"
With data: "", for example "explorer.exe"
Spreads through...
It can create the following copies on removable drives, such as USB flash drives:
:WinSystemKB001.exe
It also creates an autorun.inf file in the root folder of the removable drive. The file has instructions to launch the malware automatically when the removable drive is connected to a PC with the Autorun feature turned on.
This is a common way for malware to spread. However, autorun.inf files on their own are not necessarily a sign of infection; they are also used by legitimate programs.
Payload
Steals your sensitive information
This threat can collect the following information from your PC:
PC name user name operating system version product ID installed antivirus products local IP address
It also checks to see what Windows version you are running and if you have administrator privileges.
Contacts a remote host
The stolen information is sent to the malware's command and control (C&C) server. We have seen it connect to the following servers:
count.com count .net hotlog2 .net redtd .com traficins .net
Once connected to its C&C server the worm can also receive the following commands from a malicious hacker:
Download and run files Record which keys you press Participate in DoS attacks Update itself Delete files and registry entries Find files on your PC Modify the system Hosts file Visit a URL using a hidden desktop Set the interval for retrieving commands from C&C
Analysis by Jasper ManuelLast update 03 November 2019