Home / malwarePDF  

HackTool:Win32/Gambigubo.A


First posted on 12 October 2015.
Source: Microsoft

Aliases :

There are no other names known for HackTool:Win32/Gambigubo.A.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • %USERPROFILE%\desktop\ºÃ áú±Ã¤Ã¬¬ºÃ¯»Ã·.lnk


It can make various registry changes during its installation, including:

In subkey: HKLM\Software\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}\CurrentState
Sets value: "StateValue"
With data: "0x00000003"



The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.



Payload


Connects to a remote host

We have seen this hacktool connect to a remote host, including:
  • a1.77dlq.com using port 53
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


This malware description was published using automated analysis of file SHA1 45dc164351683a9ae0cddbdc992725d5b93d0cbc.

Symptoms

The following can indicate that you have this threat on your PC:

  • You see a file similar to:
    • %USERPROFILE%\desktop\ºÃ áú±Ã¤Ã¬¬ºÃ¯»Ã·.lnk
  • You see registry modifications such as:
    • In subkey: HKLM\Software\Google\Update\ClientState\{430FD4D0-B729-4F61-AA34-91526481799D}\CurrentState
      Sets value: "StateValue"
      With data: "0x00000003"

Last update 12 October 2015

 

TOP