Home / malwarePDF  

Backdoor:Win32/Turkojan.A


First posted on 04 January 2020.
Source: Microsoft

Aliases :

Backdoor:Win32/Turkojan.A is also known as Troj/Agent-GMF, Backdoor.Win32.Turkojan.il, BackDoor-CZP, Infostealer.Gampass, Trojan Horse, TROJ_DELF.EFH.

Explanation :

Backdoor:Win32/Turkojan.A is a backdoor trojan that connects to a remote server, allowing an attacker to gain control of the entire system. InstallationBackdoor:Win32/Turkojan.A copies itself in the Windows folder as mstwain32.exe. It modifies the system registry so that its copy runs every time Windows starts: Adds value: "mstwain32"
With data: "%windir%mstwain32.exe"
To subkey: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun Payload Drops Other MalwareBackdoor:Win32/Turkojan.A drops the following files:  ntdtcstp.dll - detected as Trojan:Win32/Turkojan.A!dll cmsetac.dll - detected as Trojan:Win32/Turkojan.B!dll  Backdoor CapabilitiesBackdoor:Win32/Turkojan.A attempts to connect to a remote server to allow an attacker to gain control over an infected system. Once connected to the remote server, an attacker can perform actions, including:  Obtain passwords Sniff MSN account details Open shell Get information about the computer Get clipboard data Get process and service information Log keystrokes Download and execute arbitrary files  Analysis by Matt McCormack

Last update 04 January 2020

 

TOP