BKDR_MICROCEL.A
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Backdoor
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This backdoor arrives as a component bundled with malware/grayware packages.
TECHNICAL DETAILS
753,776 bytes
DLL
Yes
27 Nov 2012
Arrival Details
This backdoor arrives as a component bundled with malware/grayware packages.
Installation
This backdoor drops the following component file(s):
- %Temp%\~tmp{random}.old
(Note: %Temp% is the Windows Temporary folder, which is usually C:\Windows\Temp.)
Autostart Technique
This backdoor registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\6to4\Parameters
ServiceDll = {malware path}\{malware name}.dll
Other System Modifications
This backdoor adds the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Control\Session Manager
PendingFileRenameOperations = %Temp%\~tmp{random}.old
Other Details
This backdoor connects to the following possibly malicious URL:
- {BLOCKED}1.china.com
- {BLOCKED}.{BLOCKED}.239.7
- {BLOCKED}.{BLOCKED}.163.8