Home / malwarePDF  

Backdoor:Win32/Glacid.A


First posted on 29 May 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/Glacid.A is also known as BackDoor.Generic15.AVRW (AVG), Trojan.Generic.KDV.620607 (BitDefender), Backdoor.Win32.Agent.ciua (Kaspersky), Trojan.Pasam (Symantec).

Explanation :



Backdoor:Win32/Glacid.A is a trojan that allows unauthorized access and control of your computer. It could connect to a command and control (C&C) server to receive commands to perform certain payloads, such as remote file execution, data theft and downloading other malware.

Installation
Backdoor:Win32/Glacid.A is installed by other malware, such as TrojanDropper:Win32/Glacid.A, and may be present with other malware such as the following:

  • <system folder>\iglicd64.dll - Trojan:Win32/Glacid.A
  • <system folder>\msjtea40.dll - Backdoor:Win32/Glacid.A
  • <system folder>\samsrv.dll - Virus:Win32/Glacid.A


Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32.



Payload
Communicates with a remote serverThis trojan attempts to connect to a C&C server named "updating.vicp.cc" using TCP port 443. The server sends instructions to the backdoor trojan to perform any of the following payloads:
  • Execute a specified application
  • Delete a file
  • Kill process by its process ID (PID)
  • Enumerate processes
  • Upload a file from the affected computer to the C&C server
  • Terminate connection
  • Get disk drive information
  • Locate file
  • Download a file to affected computer


Analysis by Vincent Tiu

Last update 29 May 2012

 

TOP