Home / malwarePDF  

Backdoor.Ratenjay.C


First posted on 24 January 2015.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Ratenjay.C.

Explanation :

The Trojan horse may arrive on the compromised computer after being spread through a removable drive.

When the Trojan is executed, it may create the following files:
%SystemDrive%\Documents and Settings\All Users\Start Menu\Programs\Startup\[INSTALL NAME]%RemovableDrive%\[INSTALL NAME][INSTALL PATH]\[INSTALL NAME]%RemovableDrive%\[FILE NAME].lnk%RemovableDrive%\[SUB FOLDER].lnk
Note: [INSTALL NAME] may be one of the following values:
System.vbsKJ-w0rm.vbsw0rm.vbs
Note: [INSTALL PATH] may be one of the following values:
%Temp%%SystemDrive%\Documents and Settings\All Users\Application Data %UserProfile%%ProgramData%%ProgramFiles% %WinDir%
Note: [FILE NAME] may be any file present on the removable drive.

Note: [SUB FOLDER] may be any folder under the root of the removable drive.

The Trojan may create a subfolder with the following name if no subfolder is present:
Videos
The Trojan may create the following registry entries:
HKEY_CURRENT_USER\Windowsshell = ["TRUE"|"FALSE"]HKEY_CURRENT_USER\KJ = ["Yes"|"No"]HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[INSTALL NAME:-4] = "wscript.exe //B [INSTALL FOLDER]\[INSTALL NAME]"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\[INSTALL NAME] = "[INSTALL FOLDER]\[INSTALL NAME]"
Note: The Trojan determines which registry entries are created based on the current version of the Trojan.

The Trojan opens a back door, and connects to a remote location.

Note: The remote location is chosen by the attacker and can be an IP address or URL of their choice. The usual ports for the remote location are 1010 and 1991.

The Trojan repeatedly sends one of the following commands to the remote location:
READYready
The Trojan may steal the following information from the compromised computer and send it to the remote location:
Script nameComputer nameUser nameWindows versionCountry codeList of installed antivirus productsPresence of USB drivesTrojan version.Net versionFirst non-empty volume serial number
The Trojan may perform the following actions:
Uninstall itselfRestart scriptsDownload files to [INSTALL PATH\[FILE NAME]Overwrite the current script on [INSTALL PATH\[FILE NAME]Execute code contained in HTTP responsesExecute commands on the local cmd.exePing targets with a specified buffer sizeOpen URLs with the default browserEnd the scriptShut down the computerRestart the computerLog off the current profileSleep for one or two seconds every two iterationSpread itself every three iterationsDelete itself if a virtual machine is detected

Last update 24 January 2015

 

TOP

Malware :