Home / malware VirTool:MSIL/Injector.EW
First posted on 23 December 2019.
Source: MicrosoftAliases :
There are no other names known for VirTool:MSIL/Injector.EW.
Explanation :
Installation
This threat can create copies of itself to the following location:
%APPDATA% MicrosoftWindowsBthHFSrv.exe
It drops the injected file as NcbService.exe in the following directory:
%APPDATA% MicrosoftWindows
This threat can inject code into the following processes:
AppLaunch.exe RegAsm.exe RegSvcs.exe svchost.exe vbc.exe Payload
This malware can download and execute a remote file if a URL is specified in its configuration.
Additional information
Stops running if the following conditions are found:
The process name sandboxierpcss.exe is found The following video controller name descriptions are available in the system: virtualbox graphics adapter vm additions s3 trio32/64 vmware svga ii
Analysis by Zarestel FerrerLast update 23 December 2019