Home / malwarePDF  

Backdoor.Rarstone


First posted on 09 October 2015.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Rarstone.

Explanation :

Once executed, the Trojan creates the following files:
%CurrentFolder%\mshtml.dat%System%\msictl.exe
The Trojan creates the following registry entry so that it runs every time Windows starts:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"msisvc" = ""%System%\msictl.exe" -rpcss"
The Trojan then opens a back door on the compromised computer and connects to the following command-and-control (C&C) server:
free.googlenow.in/tag=info&id=15
The Trojan may then download potentially malicious files onto the compromised conmputer.

Last update 09 October 2015

 

TOP