Home / malwarePDF  

Backdoor.Kihomchi


First posted on 16 April 2014.
Source: Symantec

Aliases :

There are no other names known for Backdoor.Kihomchi.

Explanation :

When the Trojan is executed, it creates the following files:
C:\MPOS.EXEC:\MPOS_[RANDOM NUMBER].exeC:\Windows\KBankStar_[YEAR OF CREATION]_[MONTH OF CREATION]_[DAY OF CREATION].log
The Trojan creates the following registry entry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"METAPOS SERVICE MANAGER" = "C:\MPOS_[RANDOM NUMBER].EXE"

The Trojan opens a back door on the compromised computer, and connects to the following location on TCP port 1080:
211.43.222.199

The Trojan logs key strokes and stores them in the following location:
C:\Windows\KBankStar_[YEAR OF CREATION]_[MONTH OF CREATION]_[DAY OF CREATION].log

The Trojan may use the back door to perform the following actions:
Send stolen key strokes to the remote location
Download and execute a remote file

Last update 16 April 2014

 

TOP