Home / malware Backdoor:Win32/Arurizer.A
First posted on 12 March 2010.
Source: SecurityHomeAliases :
Backdoor:Win32/Arurizer.A is also known as Win-Trojan/Arurizer.28672 (AhnLab), BDS/Arurizer.A (Avira), Win32/Arugizer.A (CA), Trojan.Arucer (Dr.Web), Win32/Arurizer.A (ESET), Trojan.Win32.Arugizer.a (Kaspersky), Troj/Bckdr-RBF (Sophos), Trojan.Arugizer (Symantec).
Explanation :
Backdoor:Win32/Arurizer.A is a trojan that allows limited remote access and control of an affected computer. A remote attacker could perform actions that include uploading, downloading, deletion or execution of arbitrary files.
Top
Backdoor:Win32/Arurizer.A is a trojan that allows limited remote access and control of an affected computer. A remote attacker could perform actions that include uploading, downloading, deletion or execution of arbitrary files.
Installation
In the wild, we have observed Backdoor:Win32/Arurizer.A being distributed as a file named "Arucer.dll". It may be installed by third party software.
Payload
Allows limited remote access and control When executed, Backdoor:Win32/Arurizer.A creates a backdoor by awaiting connections using TCP port 7777. Using this backdoor, a remote attacker can instruct an affected computer to perform the following actions:Send hard disk partition and directory information Upload, download and delete files Execute a file Modify registry data: Additional Information Backdoor:Win32/Arurizer.A checks for the USB plugin and connection of the product "Energizer UsbCharger". If found, it will execute the command specified in the following registry: Value: "<parameters>" Subkey: HKLM\SOFTWARE\USBCharger A typical value created by the setup package is the following: %ProgramFiles%\Energizer UsbCharger\Energizer UsbCharger.exe" -liuhong
Adds Value: "svchost"
Data: "<specified by the attacker>"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\svchost
Analysis by Chun FengLast update 12 March 2010