Home / malwarePDF  

Backdoor:Win32/Poison.E


First posted on 21 March 2013.
Source: Microsoft

Aliases :

Backdoor:Win32/Poison.E is also known as Trojan/Win32.Hupigon (AhnLab), BDS/Poisonivy.20.B (Avira), Backdoor.Hupigon.1178 (BitDefender), Backdoor.Poison.IXQ (Rising AV).

Explanation :



Installation

Backdoor:Win32/Poison.E tries to copy itself to your computer as "<system folder>\svchost.exe".

Note that a legitimate Windows file also named "svchost.exe" exists by default in the same folder. Therefore the copy attempt likely fails.

It creates the following registry entry so that it automatically runs every time Windows starts:

In subkey: HKLM\Software\Microsoft\Active Setup\Installed Components\<CLSID>
Sets value: "StubPath"
With data: "<system folder>\svchost.exe"

where <CLSID> is the class ID for this malware.



Payload

Allows backdoor access and control

Backdoor:Win32/Poison.E connects to a remote server to receive commands, allowing a remote attacker to gain access of your computer. To bypass common firewall programs, Backdoor:Win32/Poison.E opens an "iexplore.exe" process and injects itself into it. Once injected into this process, it contacts a remote server to receive commands.

A server it's know to contact is "lsls.3322.org" using TCP port 3460.

Once connected, it performs certain actions as specified by a remote attacker, for example, downloading and running arbitrary files, and logging keystrokes.

Additional information

Backdoor:Win32/Poison.E creates the mutex names "rdgSxQc12" and "nZi1cM,Aw".



Analysis by Jeong Mun

Last update 21 March 2013

 

TOP