BKDR_CRAZYNET.A

 Analysis by: Anthony Joe Melgarejo

 ALIASES:

Backdoor:Win32/Crazynet.3_78 (Microsoft), Backdoor.CrazyNet.378 (FSecure), BDS/CrazyNet.51 (Antivir), Trojan horse BackDoor.CrazyNet (AVG), Backdoor.CrazyNet.378 (Bitdefender), Trojan.W32.CrazyNet.Client.50 (ClamAV), Backdoor.Win32.CrazyNet.51 (Ikarus), Win32/CrazyNet.378.Client trojan (ESET), Bck/CrazzyNet.5.0 (Panda), Backdoor.CrazyNet (VBA32)

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Backdoor

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size:

552,960 bytes

File Type:

EXE

Memory Resident:

No

Initial Samples Received Date:

17 Feb 2011

Arrival Details

This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This backdoor adds the following folders:

  • %Current%\Received Files

NOTES:
It displays a window where you can connect and control remote hosts running its server component.