Home / malwarePDF  

MonitoringTool:Win32/TektonIt


First posted on 10 September 2015.
Source: Microsoft

Aliases :

There are no other names known for MonitoringTool:Win32/TektonIt.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %APPDATA%\windows\control\data.exe
  • %APPDATA%\windows\control\install.bat
  • %APPDATA%\windows\control\rfusclient.exe
  • %APPDATA%\windows\control\run.exe
  • %APPDATA%\windows\control\rutserv.exe
  • %APPDATA%\windows\control\vp8decoder.dll
  • %APPDATA%\windows\control\vp8encoder.dll
  • %TEMP%\7e04.tmp\run.bat


The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.



Payload


Connects to a remote host

We have seen this threat connect to a remote host. Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


It can stop some processes from running on your PC, including:

  • rutserv.exe


This malware description was published using automated analysis of file SHA1 4deeb64a7e55a7095ec800bc50958405850d1930.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • %APPDATA%\windows\control\data.exe
    • %APPDATA%\windows\control\install.bat
    • %APPDATA%\windows\control\rfusclient.exe
    • %APPDATA%\windows\control\run.exe
    • %APPDATA%\windows\control\rutserv.exe
    • %APPDATA%\windows\control\vp8decoder.dll
    • %APPDATA%\windows\control\vp8encoder.dll
    • %TEMP%\7e04.tmp\run.bat

Last update 10 September 2015

 

TOP