Home / malwarePDF  

TrojanSpy:Win32/Clemint.A


First posted on 13 October 2014.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:Win32/Clemint.A.

Explanation :

Threat behavior

Installation

TrojanSpy:Win32/Clemint.A copies itself to %windir%\mcclient.exe.

Payload

Changes system security settings
TrojanSpy:Win32/Clemint.A adds itself to the list of applications that can access the Internet without being stopped by your firewall. It does this by making the following registry modification:

Adds value: "C:\WINDOWS\mcclient.exe"
With data: "c:\windows\mcclient.exe:*:enabled:mcclient"
To subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Contacts remote hosts
The malware can contact the following remote hosts:

  • mcclient.0catch.com using port 80
  • mcclient.freetzi.com using port 80
  • tools.google.com using port 80
  • tools.google.com using port 443

Commonly, malware contacts a remote host to:
  • Confirm Internet connectivity
  • Report a new infection to its author
  • Receive configuration or other data
  • Download and run files (including updates and other malware)
  • Receive instruction from a remote hacker
  • Upload information taken from your PC

This malware description was produced and published using automated analysis of file SHA1 72110afaaa50160f1d9cc33fe1b72e0bde118095.Symptoms

System changes

The following could indicate that you have this threat on your PC:

  • You have these files:

    %windir%\mcclient.exe
  • You see these entries or keys in your registry:

    Sets value: "C:\WINDOWS\mcclient.exe"
    With data: "c:\windows\mcclient.exe:*:enabled:mcclient"
    In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List

Last update 13 October 2014

 

TOP