Home / malware Backdoor:Win32/PcClient.ZR
First posted on 02 March 2019.
Source: MicrosoftAliases :
Backdoor:Win32/PcClient.ZR is also known as Win32/Farfli.AK trojan, BackDoor.Bull.130, Backdoor.Torr!L1dYZ/5Uy+Y, Backdoor.Win32.Drwolf.hnu, Backdoor.Win32.Torr.fkf, Mal_Vundo-4, W32/Redosdru.D.gen!Eldorado, Win-Trojan/Securisk.
Explanation :
Backdoor:Win32/PcClient.ZR, a variant of the Backdoor:Win32/PcClient family, is malware that may be used by other Backdoor:Win32/PcClient components and may allow backdoor access and control of an affected computer.
This malware may also download and execute additional components onto your computer.
Installation
Backdoor:Win32/PcClient.ZR is a component DLL (dynamic link library) file that is dropped by a separate Backdoor:Win32/PcClient malware package into the Windows System folder. In the wild we have seen the DLL file with the following file names:
17971656.dll 6to432.dll
Note:refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:WinntSystem32"; for XP, Vista, and 7 it is "C:WindowsSystem32".
Backdoor:Win32/PcClient.ZR registers itself as a service on your computer by modifying the registry as follows:
In subkey: HKLMSystemCurrentControlSetServicesParameters (for example, "HKLMSystemCurrentControlSetServices17971656Parameters")
Sets value: "ServiceDll"
With data: "" (for example, " 17971656.dll")
Payload
Allows backdoor access and control
Backdoor:Win32/PcClient.ZR may attempt to connect to the website "fghziyi.3322.org" using a specific port. It may connect to port 1229 or the default HTTP port 80 to download arbitrary files or receive commands.
Logs keystrokes
Backdoor:Win32/PcClient.ZR collects information about your computer and starts a keylogging routine to monitor and collect information about the following:
System activity, such as keystrokes Window titles User names Passwords
It saves this information to the file "syslog.dat".
Additional information
Backdoor:Win32/PcClient.ZR also performs the following registry modification:
In subkey: HKLMSystemCurrentControlSetServices(for example, "HKLMSystemCurrentControlSetServices17971656")
Sets value: "rcx"
Sets value: "reg"
With data: ""
This modification may be used as an infection marker, which could indicate the presence of this malware on your computer.
Analysis by Jireh SanicoLast update 02 March 2019