Home / malwarePDF  

Backdoor.Miras


First posted on 22 August 2014.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Miras.

Explanation :

When the Trojan is executed, it creates the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\Parameters\"ServiceDll"=C:\WINDOWS\System32\wbem\raswmi.dllHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\"Type"= 0x00000010HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\"Start"= 0x00000002HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\"ErrorControl"=0x00000001HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\"DisplayName"= "WMI service provider"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\raswmi\"Description"="WMI service client"
The Trojan creates the following file:
%System%\wbem\raswmi.dll

The Trojan calculates DiskFreeSpaceA and stores it in the following location:
[RANDOM NUMBER]lu.tmp

The Trojan opens a back door on the compromised computer and connects to the following location:
microsoften.com

The Trojan steals the following information and sends it to the command-and-control server:
Default computer languageOperating system versionComputer nameUser name
The Trojan may perform the following actions:
Terminate processesExecute files

Last update 22 August 2014

 

TOP