Home / malwarePDF  

Trojan:Win32/Lethic.B


First posted on 15 February 2019.
Source: Microsoft

Aliases :

Trojan:Win32/Lethic.B is also known as Packed.Win32.Krap.x, Trojan.Lethic.B, Win32/Lethic.AA, Trj/Zlob.KH, Trojan.CryptRedol.Gen.2.

Explanation :

Installation This threat may drop copies of itself with different file names in the Windows system folder, for example:   shelldm.exe xcllsx.exe   Note - refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32.   It creates entries in the system registry to ensure that its dropped copies run every time Windows starts:   Adds value: "Taskman"
With data: ""
To subkey: HKLMSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon   Adds value: "Shell"
With data: "explorer.exe,"
To subkey: HKCUSOFTWAREMicrosoftWindows NTCurrentVersionWinlogon   Adds value: ""
With data: ""
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun   For example:   Adds value: "zmmclr"
With data: "xcllsx.exe"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun   Adds value: "wesspell"
With data: "shelldm.exe"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionRun   It injects its code into the 'explorer.exe' process. Payload Connects to a remote server The threat attempts to establish a connection to remote servers through various TCP ports. For example:   Attempts connecting to 'lycomputing.com' via TCP port 1430
Attempts connecting to 'nuygtfcwq.com' via TCP port 8900   Some of the remote sites it attempts to connect to are:   b1ijh7hifd.com
btceswqdw.com
lxforbug.com
lycomputing.com
miniknfdw.com
mojujfdhew.com
nhi8ho9lbnw.com
nuygtfcwq.com
sometimesgood.com
uckybusy.com   Once connected, it may allow remote access and control of an affected machine.   Analysis by Elda Dimakiling

Last update 15 February 2019

 

TOP