Home / malware Backdoor:W32/Spyrat.D
First posted on 10 March 2011.
Source: SecurityHomeAliases :
There are no other names known for Backdoor:W32/Spyrat.D.
Explanation :
A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.
Additional Details
Installation
The malware creates a dummy winlogon.exe process where it runs its malicious threads and drops the following copy:
- %appdata%\Winlogon\winlogon.exe
It also creates a legitimate winlogon.exe to %windir%\system32\install\Windows.exe.
Registry
The malware creates the following registry launch point:
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
%path_of_executed_file% = %appdata%\Winlogon\winlogon.exe
The following registry entries would also be created:
- HKEY_CURRENT_USER\Software\chuck norris
FirstExecution = %date_time%
NewIdentification = "chuck norris"
NewGroup = 2
Backdoor Functionality
The malware is a reverse connection remote administration tool. It connects to chucknorris.zapto.org at port 150 to get its command.Last update 10 March 2011