Win32/Poweliks [Threat Name] go to Threat

Win32/Poweliks.A [Threat Variant Name]

Available cleaner [Download Poweliks Cleaner ]

Category trojan
Size 75776 B
Detection created Apr 03, 2014
Signature database version 10000
Aliases Backdoor.Win32.PMax.aswv (Kaspersky)
  Trojan:Win32/Danglo!gmb (Microsoft)
  BDS/PMax.aswv (Avira)
Short description

Win32/Poweliks.A is a trojan which tries to download other malware from the Internet. It can be controlled remotely.

Installation

When executed, the trojan copies itself into the following location:

  • %malwarefilepath%:0

In order to be executed on every system start, the trojan sets the following Registry entry:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "䀀" = "rundll32.exe javascript:"\­..\­mshtml,RunHTMLApplication ";document.write("\­74script language=jscript.encode>"+(new%20ActiveXObject("WScript.Shell")).RegRead("HKCU\­\­software\­\­microsoft\­\­windows\­\­currentversion\­\­run\­\­")+"\­74/script]>"

The following Registry entry is set:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "(Default)" = %encodedpayloaddata%

The trojan launches the following processes:

  • %windir%\­syswow64\­dllhost.exe
  • %windir%\­system32\­dllhost.exe

The trojan creates and runs a new thread with its own code within these running processes.


After the installation is complete, the trojan deletes the original executable file.

Information stealing

The trojan collects the following information:

  • malware version
  • operating system version

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


The trojan contains a list of (9) URLs. The HTTP protocol is used.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • update itself to a newer version

The trojan keeps various information in the following Registry keys:

  • [HKEY_CURRENT_USER\­software\­classes\­clsid\­{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\­localserver32\­f]
  • [HKEY_CURRENT_USERsoftware\­classes\­clsid\­{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\­localserver32\­f]

Please enable Javascript to ensure correct displaying of this content and refresh this page.