Home / malwarePDF  

Backdoor:Win32/PcClient.ZR


First posted on 02 March 2019.
Source: Microsoft

Aliases :

Backdoor:Win32/PcClient.ZR is also known as Win32/Farfli.AK trojan, BackDoor.Bull.130, Backdoor.Torr!L1dYZ/5Uy+Y, Backdoor.Win32.Drwolf.hnu, Backdoor.Win32.Torr.fkf, Mal_Vundo-4, W32/Redosdru.D.gen!Eldorado, Win-Trojan/Securisk.

Explanation :

Backdoor:Win32/PcClient.ZR, a variant of the Backdoor:Win32/PcClient family, is malware that may be used by other Backdoor:Win32/PcClient components and may allow backdoor access and control of an affected computer.

This malware may also download and execute additional components onto your computer.

Installation

Backdoor:Win32/PcClient.ZR is a component DLL (dynamic link library) file that is dropped by a separate Backdoor:Win32/PcClient malware package into the Windows System folder. In the wild we have seen the DLL file with the following file names:

17971656.dll 6to432.dll

Note: refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:WinntSystem32"; for XP, Vista, and 7 it is "C:WindowsSystem32".

Backdoor:Win32/PcClient.ZR registers itself as a service on your computer by modifying the registry as follows:

In subkey: HKLMSystemCurrentControlSetServicesParameters (for example, "HKLMSystemCurrentControlSetServices17971656Parameters")
Sets value: "ServiceDll"
With data: "" (for example, "17971656.dll")

Payload

Allows backdoor access and control

Backdoor:Win32/PcClient.ZR may attempt to connect to the website "fghziyi.3322.org" using a specific port. It may connect to port 1229 or the default HTTP port 80 to download arbitrary files or receive commands.

Logs keystrokes

Backdoor:Win32/PcClient.ZR collects information about your computer and starts a keylogging routine to monitor and collect information about the following:

System activity, such as keystrokes Window titles User names Passwords

It saves this information to the file "syslog.dat".

Additional information

Backdoor:Win32/PcClient.ZR also performs the following registry modification:

In subkey: HKLMSystemCurrentControlSetServices (for example, "HKLMSystemCurrentControlSetServices17971656")
Sets value: "rcx"
Sets value: "reg"
With data: ""

This modification may be used as an infection marker, which could indicate the presence of this malware on your computer.

Analysis by Jireh Sanico

Last update 02 March 2019

 

TOP

Malware :