Home / malwarePDF  

Backdoor.Klabcon


First posted on 11 June 2014.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Klabcon.

Explanation :

It has been reported that the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158) is being exploited to spread this Trojan.

When the Trojan is executed, it drops the following clean digitally signed file:
%ProgramFiles%\WinSys\NtSmart.exe

It may also drop the following files:
%ProgramFiles%\WinSys\nvsmartmax.dll%ProgramFiles%\WinSys\Svchost.dll%System%\MsTel32.dll
The Trojan then opens a back door on the compromised computer, and connects to one or more of the following domains:
anakin.kmdns.netrookie819.eicp.net
The Trojan steals the following information from the compromised computer and sends it to the remote attacker:
Computer nameOperating system informationVolume information

Last update 11 June 2014

 

TOP