Home / malwarePDF  

TrojanSpy:MSIL/Golroted.B


First posted on 08 March 2019.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:MSIL/Golroted.B.

Explanation :

Installation

We have seen the threat with the following file names:

RE_Signed_Invoice_&_Deposit_Slip.zip^New_Order.scr Re_Please_Correct_your_Bank_Swift.zip^Re_Please_Correct_your_Bank_Swift.scr

The threat drops a copy of itself as appreadiness.exe in the %APPDATA%microsoft folder. It also drops a component file, defragsvc.exe, in the folder.

The component file, detected as Trojan:MSIL/Golroted, changes the following registry entry so that it runs each time you start your PC:

In subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun
Sets value: "Application Readiness"
With data: ", for example "%APPDATA%microsoftdefragsvc.exe"

Payload

Steals product keys and personal information

The threat runs a command-line password and product key recovery tool in the background. We have seen it use the following tools:

HackTool:Win32/Mailpassview HackTool:Win32/IEPassview

The threat tries to steal information stored on your PC, including:

Game product keys Skype contacts Minecraft credentials Clipboard FTP password

The information generated by the recovery tool is sent to back to the user via email.

The tool also records keystrokes you make when using your PC.

Analysis by Zarestel Ferrer

Last update 08 March 2019

 

TOP