Home / malwarePDF  

Backdoor:Win32/Bifrose.IQ


First posted on 13 May 2013.
Source: Microsoft

Aliases :

Backdoor:Win32/Bifrose.IQ is also known as Win32/Kryptik.AAHE (ESET), Backdoor.Win32.Bifrose (Ikarus), Mal/Behav-043 (Sophos), Mal_OtorunN (Trend Micro), TR/Strictor.500.1 (Avira), Worm/Win32.AutoRun (AhnLab).

Explanation :



Installation

When run, Backdoor:Win32/Bifrose.IQ drops a copy of itself with the file name cachemgr.exe, under the directory c:\setup.

Backdoor:Win32/Bifrose.IQ modifies the following registry entries to ensure that its copy runs at each Windows start:

In subkey: HKLM\Software\Microsoft\Active Setup\Installed Components\2CBE016A-8F28-4E0C-83A6-6079161294D7
Sets value: StubPath
With data: C:\setup\cachemgr.exe -ax

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: StubPath
With data: C:\setup\cachemgr.exe -as

The trojan also creates a text file with the name csetup.txt in the C:\setup folder. This text file contains the dates that the trojan is run.



Payload

Performs distributed denial of service (DDoS) attacks

Backdoor:Win32/Bifrose.IQ attempts to use your computer to perform distributed denial of service (DDoS) attacks against certain IT companies.

Downloads other files (which may be malware)

When installed on your computer, Backdoor:Win32/Bifrose.IQ attempts to access and download files from secure-system-updates.net/<removed>/system/update.php. The URL is no longer available, so we are unable to confirm the nature of the downloaded files.

Additional information

Backdoor:Win32/Bifrose.IQ creates the following mutexes, possibly as an infection marker to prevent multiple instances running on your computer:

  • 2CBE016A-8F28-4E0C-83A6-6079161294D7
  • Bif123




Analysis by Justin Kim

Last update 13 May 2013

 

TOP