HackTool.Win32.RAdmin.GB
HackTool.Win32.Remoxec.c (KASPERSKY), VirTool:Win32/RemoteExec (MICROSOFT)
Windows
Threat Type: Hacking Tool
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Other Details
This Hacking Tool does the following:
- It uses Windows Service Control Manager to start its service - RemComSvc
- Creates three pipes and connect to them
- RemCom_stdout
- RemCom_stdin
- RemCom_stderr
- Creates a main pipe used for its communication which allows arbitrary command execution from a malicious user
- RemCom_Communication
- Accepts a command line parameter used for file and service creation
- It can execute processes remotely from a malicious actor.
- It can send files to remote systems.
- It can receive files from remote systems.
- It allows execution of remote shell commands.
- It can impersonate user tokens for privilege elevation and as a replacement for "Runas" command
- It should be started as a service to proceed with its routine.
SOLUTION
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Scan your computer with your Trend Micro product to delete files detected as HackTool.Win32.RAdmin.GB. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.