Home / malwarePDF  

Trojan:W32/Agent.KOG


First posted on 14 January 2010.
Source: SecurityHome

Aliases :

Trojan:W32/Agent.KOG is also known as Trojan.Hydraq (Symantec).

Explanation :

Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.

Additional DetailsTrojan:W32/Agent.KOG is a trojan that is capable of functioning as a backdoor. Once installed on a machine, Agent.KOG allows remote attackers to connect to the infected machine and steal information from it.

The trojan itself is a Windows DLL component may be dropped on the system as part of the payload of another malware.

Installation

On execution, the DLL component is installed as a Windows service. To do so, the following registry keys are created:

€ [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}]
"ErrorControl" = dword:00000004
"Start" = dword:00000004
"ImagePath" = "%systemroot%\system32\svchost.exe -k netsvcs"
"ObjectName" = "LocalSystem"
It aslo creates the following subkeys:

€ [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}\Security] € [HKLM\SYSTEM\CurrentControlSet\Services\RaS{4 random characters}\Parameters]
In addition, it also modifies the registry data "netsvcs" in the existing svchost service:

€ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SvcHost\"netsvcs"
to function as a launchpoint for the trojan backdoor.

Activity

Once installed, the DLL component uses the Windows socket to send data from the infected machine to an external server, as well as potentially receiving data/commands from the remote attacker.

Last update 14 January 2010

 

TOP