Home / malwarePDF  

Backdoor.Fimlis


First posted on 14 February 2016.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Fimlis.

Explanation :

When the Trojan is executed, it creates the following files:
%Temp%\conhost.exe
The Trojan may connect to the following location:
Port 133.100.202.85 on port 443
The Trojan performs the following actions as long as autchk.xml does not exist in the Windows directory:
Sends the tick count when the connection thread first startedSends the computer name to the remote locationReceive commands to do nothing or run a file
The Trojan may perform the following actions if it receives a command to run a file:
Download a command line to run along with an optional executableCreate a file named conhost.exe in the temporary directory
The Trojan may create the following file if conhost.exe already exists:
%Temp%\[HEXADECIMAL NUMBER]MSI[HEXADECIMAL NUMBER].exe
The Trojan may then perform the following actions:
Writes the received executable to a specific fileRun the executable with the specified command line optionsRun the command line if an executable was not includedWait for a process to exit and then delete it if an executable was written
The Trojan may perform other malicious actions by downloading and executing arbitrary files.

Last update 14 February 2016

 

TOP