Home / malwarePDF  

Backdoor:Win32/Afcore.BB


First posted on 23 December 2013.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Afcore.BB.

Explanation :

Threat behavior

Installation

Backdoor:Win32/Afcore.BB is installed by Backdoor:Win32/Afcore. When the installer trojan is run, it drops the following files:

  • %TEMP% \.dll - Backdoor:Win32/Afcore.BB
  • \.dll - Backdoor:Win32/Afcore.BB
  • \.dat - data file
  • \.dat - data file
  • \.dat - data file
It modifies the following registry entries so that the DLL in the %TEMP% folder runs each time you start your PC: In subkey: HKLM\Software\Classes\CLSID\{}
Sets value: "(default)"
With data: In subkey: HKLM\SOFTWARE\Classes\CLSID\{}\InprocServer32
Sets value: "(default)"
With data: "\.dll" In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\
Sets value: "(default)"
With data: "{}" After installing Backdoor:Win32/Afcore.BB, Backdoor:Win32/Afcore deletes itself by running instructions within a command shell (cmd.exe). The DLL is then injected into Explorer.exe to hide itself and bypass firewalls.

Payload

Allows remote access and control

Win32/Afcore.BB opens a TCP port and awaits commands from a hacker. A hacker can tell the trojan to capture passwords and attack other computers.

Analysis by Andrei Florin Saygo Symptoms

Alerts from your security software may be the only symptom.

Last update 23 December 2013

 

TOP