Home / malware Backdoor.Lokidok
First posted on 28 March 2014.
Source: SymantecAliases :
There are no other names known for Backdoor.Lokidok.
Explanation :
When the Trojan is executed, it creates the following files: %System%\cvpnd.exe%System%\scardsrv.exe
Next, the Trojan modifies the following registry entries: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\irmon\Parameters\"ServiceDll" = "[THREAT FILE PATH]"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\helpsvc\Parameters\"ServiceDll" = "[THREAT FILE PATH]"
The Trojan may then perform the following actions: Monitor the network for specially crafted ICMP packetsDecrypt data from ICMP packets and use it as a parameter for running %System%\cmd.exeEncrypt data and send it to the IP address that sent the ICMP packetsLast update 28 March 2014