Home / malwarePDF  

DDoS:MSIL/Bracobo.A


First posted on 29 January 2015.
Source: Microsoft

Aliases :

There are no other names known for DDoS:MSIL/Bracobo.A.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %APPDATA%\microsoft\aelookupsvi.exe
  • %APPDATA%\microsoft\profsvc.exe
  • \c73937393.bat


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKCU\software\microsoft\windows\currentversion\run
Sets value: "Application Experience"
With data: "%APPDATA%\microsoft\aelookupsvi.exe"



The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.



Payload


Connects to a remote host

We have seen this threat connect to a remote host, including:
  • camohomohopper.no-ip.biz using port 55151
  • camohomopopper.no-ip.biz using port 55152
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate
This malware description was published using automated analysis of file SHA1 6b414947e04c3e3d99b60dced26e760441276d57. Symptoms

The following can indicate that you have this threat on your PC:

  • You see these files:
    • %APPDATA%\microsoft\aelookupsvi.exe
    • %APPDATA%\microsoft\profsvc.exe
    • \c73937393.bat
  • You see registry modifications such as:
    • In subkey: HKCU\software\microsoft\windows\currentversion\run
      Sets value: "Application Experience"
      With data: "%APPDATA%\microsoft\aelookupsvi.exe"

  • The presence of a mutex such as:
    • DC_MUTEX-FY6YKFW

Last update 29 January 2015

 

TOP