Home / malware Backdoor:Win32/Kriskynote.B
First posted on 29 January 2015.
Source: MicrosoftAliases :
There are no other names known for Backdoor:Win32/Kriskynote.B.
Explanation :
Threat behavior
Installation
This threat can create files on your PC, including:
\ntuserex.dll \ntuserex.dat
Payload
Allows backdoor access and control
This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, including:
- Deleting files
- Downloading and running files
- Logging your keystrokes or stealing your sensitive data
- Modifying your system settings
- Running or stopping applications
- Spreading malware to other PCs
- Uploading files
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- gs4.playdr2.tw using port 80
This malware description was published using automated analysis of file SHA1 47c6a80dfa4eb8e1bab9f5a06842c84fd4cb9bd6. Symptoms
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
The following can indicate that you have this threat on your PC:
- You see these files:
\ntuserex.dll
- You see registry modifications such as:
- In subkey: HKLM\system\currentcontrolset\services\
\parameters
Sets value: "ServiceDll"
With data: "\ntuserex.dll"
- In subkey: HKLM\system\currentcontrolset\services\
Sets value: "Description"
With data: "monitoring of hardwares and automatically updates the device drivers"
Last update 29 January 2015