BKDR_QAKBOT.BJ
Windows 98, ME, NT, 2000, XP, Server 2003
Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
However, as of this writing, the said sites are inaccessible.
It executes then deletes itself afterward.
It connects to a website to send and receive information.
TECHNICAL DETAILS
377,984 bytes
PE
UPX
Yes
30 Jul 2010
Connects to URLs/Ips
Arrival Details
However, as of this writing, the said sites are inaccessible.
Installation
This backdoor drops the following copies of itself into the affected system:
- %AllUsersAppData%\Microsoft\{Random Folder Name}\{Random File Name}
It executes then deletes itself afterward.
Backdoor Routine
This backdoor connects to the following websites to send and receive information:
- http://hostrmeter.com/cgi-bin/exhandler4.pl
Download Routine
This backdoor accesses the following websites to download files:
- http://nt14.in/cgi-bin/jl/jloader.pl?r=q/qa.bin&n=pvsnd2639&it=3&b=1
SOLUTION
8.900
Step 1
Scan your computer with your Trend Micro product and note files detected as BKDR_QAKBOT.BJ
Step 2
Scan your computer with your Trend Micro product to delete files detected as BKDR_QAKBOT.BJ. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.