Home / malwarePDF  

Backdoor:Win32/Kriskynote.B


First posted on 29 January 2015.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Kriskynote.B.

Explanation :

Threat behavior

Installation
This threat can create files on your PC, including:

  • \ntuserex.dll
  • \ntuserex.dat


Payload


Allows backdoor access and control

This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, including:

  • Deleting files
  • Downloading and running files
  • Logging your keystrokes or stealing your sensitive data
  • Modifying your system settings
  • Running or stopping applications
  • Spreading malware to other PCs
  • Uploading files


Connects to a remote host

We have seen this threat connect to a remote host, including:
  • gs4.playdr2.tw using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate
This malware description was published using automated analysis of file SHA1 47c6a80dfa4eb8e1bab9f5a06842c84fd4cb9bd6. Symptoms

The following can indicate that you have this threat on your PC:

  • You see these files:
    • \ntuserex.dll
  • You see registry modifications such as:
    • In subkey: HKLM\system\currentcontrolset\services\\parameters
      Sets value: "ServiceDll"
      With data: "\ntuserex.dll"

    • In subkey: HKLM\system\currentcontrolset\services\
      Sets value: "Description"
      With data: "monitoring of hardwares and automatically updates the device drivers"

Last update 29 January 2015

 

TOP