Home / malware Backdoor:Win32/Fynloski.M
First posted on 23 May 2014.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Fynloski.M.
Explanation :
Threat behavior
Installation
Backdoor:Win32/Fynloski.M copies itself to c:\documents and settings\administrator\my documents\msdcsc\msdcsc.exe. The malware changes the following registry entries so that it runs each time you start your PC:
Sets value: "Userinit"
With data: "c:\windows\system32\userinit.exe,c:\documents and settings\administrator\my documents\msdcsc\msdcsc.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon The malware uses code injection to make it harder to detect and remove. It can inject code into running processes, including the following:
- notepad.exe
Payload
Allows backdoor access and control
Backdoor:Win32/Fynloski.M gives a malicious hacker access and control of your PC. They can then perform a number of different actions, including:
- Downloading and running files
- Uploading files
- Spreading malware to other PCs
- Logging your keystrokes or stealing your sensitive data
- Modifying your system settings
- Running or stopping applications
- Deleting files
This malware description was produced and published using automated analysis of file SHA1 b420f2e42a30c8a1f0b95d7655bb94e52f7f34cd.Symptoms
System changes
The following could indicate that you have this threat on your PC:
- You have these files:
c:\documents and settings\administrator\my documents\msdcsc\msdcsc.exe
- You see these entries or keys in your registry:
Sets value: "Userinit"
With data: "c:\windows\system32\userinit.exe,c:\documents and settings\administrator\my documents\msdcsc\msdcsc.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonLast update 23 May 2014