MSIL/Duawlor [Threat Name] go to Threat

MSIL/Duawlor.A [Threat Variant Name]

Category trojan
Size 39424 B
Detection created Mar 27, 2014
Detection database version 9601
Aliases PWS:MSIL/Mintluks.A (Microsoft)
Short description

The trojan serves as a backdoor. It can be controlled remotely.

Installation

The trojan does not create any copies of itself.


The following Registry entry is set:

  • [HKEY_LOCAL_MACHINE\­SOFTWARE\­Microsoft\­Windows\­CurrentVersion\­Policies\­System]
    • "EnableLUA" = 0
Information stealing

The trojan collects the following information:

  • logged keystrokes
  • MAC address
  • user name
  • operating system version
  • CPU information
  • screenshots
  • list of running processes
  • list of files/folders on a specific drive
  • login passwords for certain applications/services

The trojan steals login credentials related to following applications:

  • Google Chrome

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a URL address. The HTTP protocol is used.


It may perform the following actions:

  • download files from a remote computer and/or the Internet
  • run executable files
  • log keystrokes
  • capture screenshots
  • terminate running processes
  • display a dialog window
  • shut down/restart the computer
  • log off the current user
  • lock the computer
  • put the system into hibernation
  • send the list of running processes to a remote computer
  • send the list of files on a specific drive to a remote computer
  • upload files to a remote computer
  • perform Bitcoin mining
  • send gathered information

The trojan may attempt to download files from the Internet.


The files are stored in the following locations:

  • %appdata%\­ufaminer.exe
  • %appdata%\­miner.dll
  • %appdata%\­usft_ext.dll
  • %appdata%\­cgminer.exe
  • %appdata%\­libcurl-4.dll
  • %appdata%\­libpdcurses.dll
  • %appdata%\­libusb-1.0.dll
  • %appdata%\­OpenCL.dll
  • %appdata%\­phatk120223.cl
  • %appdata%\­poclbm120327.cl
  • %appdata%\­pthreadGC2.dll
  • %appdata%\­pthreadGC2-w32.dll

The trojan executes the following files:

  • %appdata%\­ufaminer.exe
  • %appdata%\­cgminer.exe

Please enable Javascript to ensure correct displaying of this content and refresh this page.