Home / malware Backdoor:Win32/Xtrat
First posted on 31 March 2015.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Xtrat.
Explanation :
Threat behavior
This backdoor is a remote access tool (RAT) that is used by malware authors to install malware on your PC.
Installation
When run, it drops copy to varying folder location using random filename. Among possible folder locations are:
- %SystemRoot% \
\ - %APPDATA% \
For example, we have seen it drop server.exe to the folder InstallDir.
It changes the following registry entry so that it runs each time you start your PC:
In subkey: HKLM\Software\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath\
Sets value: "\install\server.exe restart"
It may open a new prcocess and inject code into it. It may do this to try to hide from security software.
Spreads through
Removable drives
It can create copies of itself on removable drives, such as USB flash drives.
It creates an autorun.inf file in the root folder of the removable drive. The file has instructions to launch the malware automatically when the removable drive is connected to a PC with the Autorun feature turned on.
This is a common way for malware to spread. However, autorun.inf files on their own are not necessarily a sign of infection; they are also used by legitimate programs.
File sharing websites
The threat might be downloaded from a file sharing website. You might try to download an app, and instead have this malware installed on your PC.
Payload
Steals sensitive data
This threat can:
- Install a keylogger on the computer, to record what you type on your keyboard (including passwords).
- Capture screenshots of your desktop
- Record images from your webcam
- Record audio from your webcam or microphone
It can regularly send the collected report to a remote server. We have seen it try to connect to the following servers:
- 58.138.194.5
- googlechrom2e.linkpc.net
- sercan860.zapto.org
It might use IP redirection or masking services to hide the server.
Additional information
The threat creates the following mutexes:
- ((Mutex))
- XTREMEUPDATE
These can be infection markers to prevent more than one copy of the threat running on your PC.
Analysis by Mihai Calota
Symptoms
The following can indicate that you have this threat on your PC:
- You see this entry or key in your registry:
In subkey: HKLM\Software\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath\
Sets value: "\install\server.exe restart" Last update 31 March 2015