TSPY_KEGOTIP.YNF
PWS:Win32/Kegotip.D (Microsoft); Trojan-PSW.Win32.Minari.li (Kaspersky);
Windows
Threat Type: Spyware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
256,000 bytes
EXE
Yes
31 Aug 2015
Arrival Details
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Autostart Technique
This spyware adds the following registry entries to enable its automatic execution at every system startup:
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
regedit32 = "{malware path and file name}"
Other System Modifications
This spyware adds the following registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\
List
{malware path and file name} = "{malware path and file name}:*:Enabled:Microsoft Office"
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion
VendorId = "{random values}"
Other Details
This spyware connects to the following possibly malicious URL:
- http://{BLOCKED}.{BLOCKED}.100.103/