Home / malware Backdoor:Win32/Wkysol.G
First posted on 19 January 2012.
Source: MicrosoftAliases :
Backdoor:Win32/Wkysol.G is also known as Trojan/Win32.Npkon (AhnLab), Trojan.Win32.Sasfis.crqp (Kaspersky), Backdoor.Sykipot!AWykAQlotQc (VirusBuster), Win32/Wisp.C trojan (ESET), Backdoor.Win32.Wkysol (Ikarus).
Explanation :
Backdoor:Win32/Wkysol.G is malware that allows backdoor access and control of the affected computer. In the wild, it has been observed to be bundled with Exploit:JS/Pdfjsc.Y and Exploit:Win32/CVE-2011-2462 variants.
Top
Backdoor:Win32/Wkysol.G is malware that allows backdoor access and control of the affected computer. In the wild, it has been observed to be bundled with Exploit:JS/Pdfjsc.Y and Exploit:Win32/CVE-2011-2462 variants.
Installation
Backdoor:Win32/Wkysol.G modifies the registry so that it automatically starts at every Windows start:
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "start"
With data: "<malware path>\<malware file name> -install"
It then drops and installs its backdoor component using any of the following file names:
- <backdoor path>\nwxl.dll
- <backdoor path>\rsm.dll
where <backdoor path> is one folder up from the %Temp% folder.
Backdoor:Win32/Wkysol.G injects its DLL component into the "iexplorer.exe" process. It does this by spawning a new copy of "iexplorer.exe" located at registry entry HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\IEXPLORE.EXE.
It also drops the configuration file "<backdoor path>\setm.ini" containing the following:
- sleep time
- remote server to connect to
- malware file name and DLL component file name
- bot ID
Payload
Allows backdoor access and control
Backdoor:Win32/Wkysol.G has been observed to connect to the remote server stored in its configuration file. In the wild, one such server it is known to connect to is "one<removed>focus.com". If connected to the server, it sends the affected computer's name and IP address as well as the bot ID value in the configuration file.
Once connected, an attacker can perform a number of actions on an affected computer. This could be, but is not limited to, the following actions:
Additional information
- Download/upload arbitrary files
- Open a remote command shell
- Start/terminate processes
- Restart the computer
- Set new timeouts value (for pausing the malware from executing and random number seed)
Backdoor:Win32/Wkysol.G has the ability to remove its components from the affected computer and delete its entry in the system registry. These can be done if the malware is run with the "-removekys" parameter.
Analysis by Rodel Finones
Last update 19 January 2012