Home / malwarePDF  

Backdoor:Win32/Kanav!rfn


First posted on 30 December 2016.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Kanav!rfn.

Explanation :

Installation
This threat can create files on your PC, including:

  • \vcapi.exe


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{DBA3B07B-0879-5C20-2CD1-7E3BB3E88D57}
Sets value: "stubpath"
With data: "%SystemRoot%\system32\vcapi.exe"

The malware uses code injection to make it harder to detect and remove. It can inject code into running processes.

Payload

Allows backdoor access and control

This threat can give a malicious hacker access and control of your PC. They can then perform a number of different actions, such as:
  • Deleting files
  • Downloading and running files
  • Logging your keystrokes or stealing your sensitive data
  • Modifying your system settings
  • Running or stopping applications
  • Spreading malware to other PCs
  • Uploading files


Connects to a remote host

We have seen this threat connect to a remote host, including:
  • www.spod.co.kr using port 80
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate


We have seen this threat access online content, including:
  • log20120122.txt


This malware description was published using automated analysis of file SHA1 27e408dcb3efaf59efa88c795794e8411d88bf78.

Last update 30 December 2016

 

TOP