Home / malwarePDF  

Trojan.Nancrat


First posted on 30 May 2014.
Source: Symantec

Aliases :

There are no other names known for Trojan.Nancrat.

Explanation :

When the Trojan is executed, it creates the following file:
%UserProfile%\Application Data\5A67D756-5897-45F9-A64B-4168421A5D5E\run.dat

The Trojan copies itself to one of the following locations:
%ProgramFiles%\DHCP Manager\dhcpmgr.exe%ProgramFiles%\UDP Monitor\udpmon.exe%ProgramFiles%\DNS Host\dnshost.exe
The Trojan creates the following registry entry so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"DHCP Manger" = "%ProgramFiles%\DHCP Manager\dhcpmgr.exe"

The Trojan gathers the following information from the compromised computer:
Computer nameCPU and RAM usageActive window (the window the user has most recently interacted with)IP addressOperating system information
The Trojan connects to a command-and-control (C&C) server and sends the gathered information to it.

NOTE: The attacker can select any URL they want and use it as their C&C server.

The Trojan opens a back door on the compromised computer, allowing an attacker to perform the following actions:
Transfer and execute filesEnter and execute commandsEdit the registryUse the compromised computer as a proxyAccess the webcam Access the microphoneView the desktopCreate instant message windowsUpdate the TrojanManage running processes

Last update 30 May 2014

 

TOP