Home / malwarePDF  

TrojanSpy:MSIL/Logkayi.A


First posted on 08 October 2015.
Source: Microsoft

Aliases :

There are no other names known for TrojanSpy:MSIL/Logkayi.A.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %LOCALAPPDATA%\rust\hack.exe


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Sets value: "Rust"
With data: "%LOCALAPPDATA%\rust\hack.exe"


Payload


Collects your sensitive information

This threat can collect your sensitive information without your consent. This can include:

  • The keys you press
  • The applications you open
  • Your web browsing history
  • Your credit card information
  • Your user names and passwords


It can also imitate a legitimate website to lure you into revealing your sensitive information.



Connects to a remote host

We have seen this threat connect to a remote host. Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


This malware description was published using automated analysis of file SHA1 487b2f125d0fec4e9d75461dd12bbc2b9f7543c9.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • %LOCALAPPDATA%\rust\hack.exe
  • You see registry modifications such as:
    • In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
      Sets value: "Rust"
      With data: "%LOCALAPPDATA%\rust\hack.exe"

Last update 08 October 2015

 

TOP