Home / malware Backdoor:Java/Frurat.A
First posted on 19 April 2013.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Java/Frurat.A.
Explanation :
Installation
Backdoor:Java/Frurat.A is a Java applet that is run when you download a file containing the malicious code. You must have Java installed on your computer for this threat to run.
It uses a configuration file that we detect as Backdoor:Java/Frurat.A!conf.
In the wild, we have seen this threat copy itself to the folder "%APPDATA%\Frutas" with one of the following file names:
- javawi.jar
- javaw.jar
- rata.jar
- servidorcito.jar
Backdoor:Java/Frurat.A modifies the following registry entry to ensure that its copy runs at each Windows start:
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "Firewall" or "Javax"
With data: ""<Java folder>\bin\javaw.exe" -jar "<backdoor path and filename>""
Notes:
- <Java folder> is a path where Java is installed, for example: "C:\Program Files\Java\jre6\"
- <Backdoor path and filename> is the path and filename of the Java applet
We have observed it attempting to prevent the following security-related tools and programs from running:
- Programs that may be security-related and from the following companies:
- AVG
- Avast
- Microsoft
- Symantec
- Mcafee
- Eset
- Kaspersky
- Avira
- Malwarebytes
- Windows security tools, including:
- Windows User Account Control
- Windows configuration tools
- Windows task manager
It does this by modifying the following registry entry:
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<legitimate program file name>
Sets value: "Debugger"
With data: "alg.exe"
The value of <legitimate program file name> can be any of the following:
- avcenter.exe
- avconfig.exe
- avfwsvc.exe
- avgamsvr.exe
- avgcc.exe
- avgemc.exe
- avgnt.exe
- avguard.exe
- avgupsvc.exe
- avmailc.exe
- avnotify.exe
- avp.exe
- avscan.exe
- avshadow.exe
- avwebgrd.exe
- avwsc.exe
- ccproxy.exe
- ccsetmgr.exe
- egui.exe
- ekrn.exe
- kav.exe
- kldw.exe
- klwtblfs.exe
- klwtbws.exe
- mbam.exe
- mbamgui.exe
- mbamservice.exe
- mcshield.exe
- MpCmdRun.exe
- MpfService.exe
- mpfsrv.exe
- MSASCui.exe
- msconfig.exe
- msscli.exe
- navapsvc.exe
- nisum.exe
- nod32km.exe
- nod32krn.exe
- nod32kui.exe
- taskmgr.exe
- UserAccountControlSettings.exe
The trojan also creates the file "frautas.lock" in the %TEMP% folder as a marker of infection.
Payload
Allows backdoor access and control
Backdoor:Java/Frurat.A tries to connect to a remote server to receive commands from a remote attacker. We have seen it try to connect to the following servers:
- 217.66.227.219
- balto.no-ip.org
- gebbix.zapto.org
- iceop.no-ip.biz
- sarahps.no-ip.biz
- spy2014.no-ip.biz
- trinks.no-ip.org
These commands can include, but are not limited to, the following:
- Downloading and uploading files to and from a remote server
- Conducting denial of service (DoS) attacks
- Uninstalling the trojan from your computer
- Ending computer processes
Analysis by Jonathan San Jose
Last update 19 April 2013