BKDR_LUMINOSITY.AUSIMJ
Windows
Threat Type: Backdoor
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
TECHNICAL DETAILS
1,110,016 bytes
EXE
13 Apr 2017
Arrival Details
This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
Installation
This Backdoor drops the following files:
- %Application Data%\Microsoft\Windows\ScreenToGif\yjakou.lnk
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It drops the following copies of itself into the affected system:
- %Application Data%\Microsoft\Windows\ScreenToGif\yjakou.exe
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
It creates the following folders:
- %Application Data%\Microsoft\Windows\ScreenToGif
- %Application Data%\Monitor
- %Application Data%\Monitor\Files
- %Application Data%\Monitor\Guard
- %Application Data%\Monitor\Logs
- %Application Data%\Monitor\Screenshots
(Note: %Application Data% is the Application Data folder, where it usually is C:\Documents and Settings\{user name}\Application Data on Windows 2000, Windows Server 2003, and Windows XP (32- and 64-bit); C:\Users\{user name}\AppData\Roaming on Windows Vista (32- and 64-bit), Windows 7 (32- and 64-bit), Windows 8 (32- and 64-bit), Windows 8.1 (32- and 64-bit), Windows Server 2008, and Windows Server 2012.)
Autostart Technique
This Backdoor adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows NT\CurrentVersion\Windows
Load = "%Application Data%\Microsoft\Windows\ScreenToGif\yjakou.lnk"
Other System Modifications
This Backdoor adds the following registry entries:
HKEY_CURRENT_USER\Software
lCPSo6c6sxtRRMHq4KmrEg== = "1Cs03RR7x8W4+sULBFel3E3gs+3L9KIqsgIgGKGBIXc="
HKEY_CURRENT_USER\Software
i1VDgAj386NT5axSyn0WYA== = "fZpQGc3gQ0KVfFuVg/luQg=="
HKEY_CURRENT_USER\Software
PTH = "%Application Data%\Microsoft\Windows\ScreenToGif\yjakou.exe"
HKEY_CURRENT_USER\Software
MTX = "{value}"
HKEY_CURRENT_USER\Software
PRC = "{numbers}"
Other Details
This Backdoor connects to the following possibly malicious URL:
- {BLOCKED}.{BLOCKED}.247.208