Home / malwarePDF  

Backdoor:Win32/Afcore.BB


First posted on 10 June 2016.
Source: Microsoft

Aliases :

There are no other names known for Backdoor:Win32/Afcore.BB.

Explanation :

Installation

Backdoor:Win32/Afcore.BB is installed by Backdoor:Win32/Afcore. When the installer trojan is run, it drops the following files:

  • %TEMP% \.dll - Backdoor:Win32/Afcore.BB
  • \.dll - Backdoor:Win32/Afcore.BB
  • \.dat - data file
  • \.dat - data file
  • \.dat - data file
It modifies the following registry entries so that the DLL in the %TEMP% folder runs each time you start your PC: In subkey: HKLM\Software\Classes\CLSID\{}
Sets value: "(default)"
With data: In subkey: HKLM\SOFTWARE\Classes\CLSID\{}\InprocServer32
Sets value: "(default)"
With data: "\.dll" In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\
Sets value: "(default)"
With data: "{}" After installing Backdoor:Win32/Afcore.BB, Backdoor:Win32/Afcore deletes itself by running instructions within a command shell (cmd.exe). The DLL is then injected into Explorer.exe to hide itself and bypass firewalls.

Payload

Allows remote access and control

Win32/Afcore.BB opens a TCP port and awaits commands from a hacker. A hacker can tell the trojan to capture passwords and attack other computers.

Analysis by Andrei Florin Saygo

Last update 10 June 2016

 

TOP